Sciweavers

3792 search results - page 193 / 759
» Techniques for Trusted Software Engineering
Sort
View
116
Voted
AC
2003
Springer
15 years 9 months ago
Naming and Integrity: Self-verifying Data in Peer-to-Peer Systems
Peer-to-peer systems are positioned to take advantage of gains in network bandwidth, storage capacity, and computational resources to provide long-term durable storage infrastruct...
Hakim Weatherspoon, Chris Wells, John Kubiatowicz
UIST
1996
ACM
15 years 8 months ago
Adding Imageability Features to Information Displays
Techniques for improving the imageability of an existing data visualisation are described. The aim is to make the visualisation more easily explored, navigated and remembered. Sta...
Matthew Chalmers, Robert Ingram, Christoph Pfrange...
146
Voted
PEPM
1997
ACM
15 years 8 months ago
A Type-directed, On-line, Partial Evaluator for a Polymorphic Language
Recently, Olivier Danvy introduced a new, simple method for implementing powerful partial evaluators, namely typedirected partial evaluation 9 . He introduced a partial evaluator ...
Tim Sheard
UIST
1992
ACM
15 years 8 months ago
Mapping GUIs to Auditory Interfaces
of audio GUIs and the abstract components of auditory interfaces. We also detail some of the techniques we are using to convey a range of interface attribute information via the au...
Elizabeth D. Mynatt, W. Keith Edwards
AVI
2008
15 years 6 months ago
Supporting visual exploration of massive movement data
To make sense from large amounts of movement data (sequences of positions of moving objects), a human analyst needs interactive visual displays enhanced with database operations a...
Natalia V. Andrienko, Gennady L. Andrienko