Sciweavers

6249 search results - page 1190 / 1250
» Topological Informational Spaces
Sort
View
OZCHI
2009
ACM
14 years 3 months ago
Brute force interactions: leveraging intense physical actions in gaming
People use a wide range of intensity when interacting with computers, spanning from subtle to brute force. However, computer interfaces so far have mainly focused on interactions ...
Florian Mueller, Stefan Agamanolis, Frank Vetere, ...
PLDI
2009
ACM
14 years 3 months ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...
EDBT
2009
ACM
138views Database» more  EDBT 2009»
14 years 3 months ago
FOGGER: an algorithm for graph generator discovery
To our best knowledge, all existing graph pattern mining algorithms can only mine either closed, maximal or the complete set of frequent subgraphs instead of graph generators whic...
Zhiping Zeng, Jianyong Wang, Jun Zhang, Lizhu Zhou
FOSSACS
2009
Springer
14 years 3 months ago
Facets of Synthesis: Revisiting Church's Problem
In this essay we discuss the origin, central results, and some perspectives of algorithmic synthesis of nonterminating reactive programs. We recall the fundamental questions raised...
Wolfgang Thomas
ICDCN
2009
Springer
14 years 3 months ago
Byzantine-Resilient Convergence in Oblivious Robot Networks
Given a set of robots with arbitrary initial location and no agreement on a global coordinate system, convergence requires that all robots asymptotically approach the exact same, ...
Zohir Bouzid, Maria Gradinariu Potop-Butucaru, S&e...
« Prev « First page 1190 / 1250 Last » Next »