Sciweavers

8623 search results - page 1599 / 1725
» Software engineering for secure systems
Sort
View
ICSE
2007
IEEE-ACM
16 years 3 months ago
Analysis of a Redundant Architecture for Critical Infrastructure Protection
Critical infrastructures like the power grid are emerging as collection of existing separated systems of different nature which are interconnected together. Their criticality becom...
Alessandro Daidone, Andrea Bondavalli, Paulo Ver&i...
142
Voted
PEPM
2009
ACM
16 years 1 days ago
Self-adjusting computation: (an overview)
Many applications need to respond to incremental modifications to data. Being incremental, such modification often require incremental modifications to the output, making it po...
Umut A. Acar
125
Voted
IUI
2010
ACM
16 years 1 days ago
The why UI: using goal networks to improve user interfaces
People interact with interfaces to accomplish goals, and knowledge about human goals can be useful for building intelligent user interfaces. We suggest that modeling high, human-l...
Dustin Arthur Smith, Henry Lieberman
124
Voted
IUI
2010
ACM
16 years 1 days ago
Facilitating exploratory search by model-based navigational cues
We present an extension of a computational cognitive model of social tagging and exploratory search called the semantic imitation model. The model assumes a probabilistic represen...
Wai-Tat Fu, Thomas George Kannampallil, Ruogu Kang
120
Voted
IUI
2010
ACM
16 years 1 days ago
An adaptive calendar assistant using pattern mining for user preference modelling
In this paper, we present SmartCal, a calendar assistant that suggests appointment attributes, such as time, day, duration, etc., given any combination of initial user input attri...
Alfred Krzywicki, Wayne Wobcke, Anna Wong
« Prev « First page 1599 / 1725 Last » Next »