Sciweavers

5722 search results - page 1031 / 1145
» Security Function Interactions
Sort
View
109
Voted
SIGSOFT
2008
ACM
16 years 3 months ago
Doloto: code splitting for network-bound web 2.0 applications
Modern Web 2.0 applications, such as GMail, Live Maps, Facebook and many others, use a combination of Dynamic HTML, JavaScript and other Web browser technologies commonly referred...
V. Benjamin Livshits, Emre Kiciman
144
Voted
SIGSOFT
2001
ACM
16 years 3 months ago
Detecting implied scenarios in message sequence chart specifications
Scenario-based specifications such as Message Sequence Charts (MSCs) are becoming increasingly popular as part of a requirements specification. Scenarios describe how system compo...
Jeff Kramer, Jeff Magee, Sebastián Uchitel
116
Voted
CHI
2009
ACM
16 years 3 months ago
Aesthetics matter: leveraging design heuristics to synthesize visually satisfying handheld interfaces
We present a tool for automatically generating UI layouts for handheld devices based on design principles. This tool introduces a gestalt approach to visual interface design rathe...
Yeonsoo Yang, Scott R. Klemmer
CHI
2009
ACM
16 years 3 months ago
Cell phone software aiding name recall
Senior citizens often find it difficult to remember names. This paper describes a novel cell phone application that uses information about one's social network and the places...
Kent Fenwick, Michael Massimi, Ronald Baecker, San...
84
Voted
CHI
2009
ACM
16 years 3 months ago
The design of ViVA: a mixed-initiative visual vocabulary for aphasia
In this paper, we present the design of ViVA, a visual vocabulary for aphasia. Aphasia is an acquired language disorder that causes variability of impairments affecting individual...
Sonya S. Nikolova, Jordan L. Boyd-Graber, Perry R....
« Prev « First page 1031 / 1145 Last » Next »