In contextual computing, where cues beyond direct user input are used to trigger computation, one of the most daunting challenges is inferring what the user is doing. For the doma...
Victoria Bellotti, Jim Thornton, Alvin Chin, Diane...
Abstract. When bees and wasps leave the nest to forage, they perform orientation or learning flights. This behaviour includes a number of stereotyped flight manoeuvres mediating ...
The use of bad names — names that are wrong, inconsistent or inconcise — hinder program comprehension. The root of the problem is that there is no mechanism for aligning the n...
In the analysis of cryptographic protocols, a treacherous set of terms is one from which an intruder can get access to what was intended to be secret, by adding on to the top of a ...
On our ongoing research on variability analysis, two major drawbacks have been identified: a) the lack of an effective tracing from the rationale to the selected variant, and b) t...