Sciweavers

1744 search results - page 288 / 349
» What's There to Talk About
Sort
View
CHI
2011
ACM
13 years 20 days ago
Post-deployment usability: a survey of current practices
Despite the growing research on usability in the predevelopment phase, we know little about post-deployment usability activities. To characterize these activities, we surveyed 333...
Parmit K. Chilana, Andrew J. Ko, Jacob O. Wobbrock...
DLOG
2011
13 years 18 days ago
Quelo: an Ontology-Driven Query Interface
In this paper we present a formal framework and tool supporting the user in the task of formulating a precise query – which best captures their information needs – even in the ...
Enrico Franconi, Paolo Guagliardo, Marco Trevisan,...
MSR
2011
ACM
12 years 12 months ago
An empirical analysis of the FixCache algorithm
The FixCache algorithm, introduced in 2007, effectively identifies files or methods which are likely to contain bugs by analyzing source control repository history. However, many ...
Caitlin Sadowski, Chris Lewis 0002, Zhongpeng Lin,...
CCS
2011
ACM
12 years 9 months ago
Automatically optimizing secure computation
On the one hand, compilers for secure computation protocols, such as FairPlay or FairPlayMP, have significantly simplified the development of such protocols. On the other hand, ...
Florian Kerschbaum
HOST
2011
IEEE
12 years 8 months ago
Enhancing security via provably trustworthy hardware intellectual property
—We introduce a novel hardware intellectual property acquisition protocol, show how it can support the transfer of provably trustworthy modules between hardware IP producers and ...
Eric Love, Yier Jin, Yiorgos Makris