Sciweavers

1995 search results - page 163 / 399
» What's the Problem
Sort
View
CEAS
2007
Springer
15 years 10 months ago
TV-ACTA: Embedding an Activity-Centered Interface for Task Management in Email
In contextual computing, where cues beyond direct user input are used to trigger computation, one of the most daunting challenges is inferring what the user is doing. For the doma...
Victoria Bellotti, Jim Thornton, Alvin Chin, Diane...
ECAL
2007
Springer
15 years 10 months ago
Improving Agent Localisation Through Stereotypical Motion
Abstract. When bees and wasps leave the nest to forage, they perform orientation or learning flights. This behaviour includes a number of stereotyped flight manoeuvres mediating ...
Bart Baddeley, Andrew Philippides
OOPSLA
2007
Springer
15 years 10 months ago
Understanding programmer language
The use of bad names — names that are wrong, inconsistent or inconcise — hinder program comprehension. The root of the problem is that there is no mechanism for aligning the n...
Einar W. Høst
RTA
2007
Springer
15 years 10 months ago
Intruders with Caps
In the analysis of cryptographic protocols, a treacherous set of terms is one from which an intruder can get access to what was intended to be secret, by adding on to the top of a ...
Siva Anantharaman, Paliath Narendran, Michaël...
VAMOS
2007
Springer
15 years 10 months ago
Using Goal-Models to Analyze Variability
On our ongoing research on variability analysis, two major drawbacks have been identified: a) the lack of an effective tracing from the rationale to the selected variant, and b) t...
Bruno González-Baixauli, Miguel A. Laguna, ...