Sciweavers

240 search results - page 29 / 48
» What do you know
Sort
View
ESOP
2005
Springer
14 years 1 months ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers
ABIALS
2008
Springer
14 years 2 months ago
Anticipative Control of Voluntary Action: Towards a Computational Model
Abstract. Human action is goal-directed and must thus be guided by anticipations of wanted action effects. How anticipatory action control is possible and how it can emerge from ex...
Pascal Haazebroek, Bernhard Hommel
SAC
2009
ACM
14 years 14 days ago
Towards "WYDIWYS" for MIMI using concept analysis
This paper presents a novel software engineering approach for developing a dynamic web interface that meets the quality criterion of “WYDIWYS” - What You Do Is What You See. T...
Jie Dai, Remo Mueller, Jacek Szymanski, Guo-Qiang ...
CACM
2000
130views more  CACM 2000»
13 years 7 months ago
Visual Generalization in Programming by Example
In Programming by Example [PBE, also sometimes called "Programming by Demonstration"] systems, the system records actions performed by a user in the interface, and produ...
Robert St. Amant, Henry Lieberman, Richard Potter,...
CIG
2006
IEEE
14 years 1 months ago
Fun in Slots
— People play games for fun. Yet we are lacking a fundamental understanding of what fun is and how fun works in games and other media. For example, why do thousands of people spe...
Kevin Burns