Sciweavers

4923 search results - page 812 / 985
» Software Risk Management
Sort
View
MOBISYS
2009
ACM
14 years 9 months ago
Fidelity-aware replication for mobile devices
Mobile devices often store data in reduced resolutions or custom formats in order to accommodate resource constraints and tailormade software. The Polyjuz framework enables sharin...
Kaushik Veeraraghavan, Venugopalan Ramasubramanian...
CHI
2008
ACM
14 years 9 months ago
SuperBreak: using interactivity to enhance ergonomic typing breaks
Repetitive strain injuries and ergonomics concerns have become increasingly significant health issues as a growing number of individuals frequently use computers for long periods ...
Dan Morris, A. J. Bernheim Brush, Brian Meyers
CHI
2008
ACM
14 years 9 months ago
Conversation pivots and double pivots
Many sites on the web offer collaborative databases that catalog items such as bands, events, products, or software modules. Conversation pivots allow readers to navigate from pag...
Daniel Xiaodan Zhou, Nathan Oostendorp, Michael He...
CHI
2005
ACM
14 years 9 months ago
Participatory design of an orientation aid for amnesics
We present the participatory design and evaluation of an orientation aid for individuals who have anterograde amnesia. Our design team included six amnesics who have extreme diffi...
Mike Wu, Ronald Baecker, Brian Richards
VLSID
2003
IEEE
180views VLSI» more  VLSID 2003»
14 years 9 months ago
Automating Formal Modular Verification of Asynchronous Real-Time Embedded Systems
Most verification tools and methodologies such as model checking, equivalence checking, hardware verification, software verification, and hardware-software coverification often fl...
Pao-Ann Hsiung, Shu-Yu Cheng