Sciweavers

138 search results - page 2 / 28
» Who Owns Your Computer
Sort
View
CAV
2005
Springer
173views Hardware» more  CAV 2005»
14 years 2 months ago
Building Your Own Software Model Checker Using the Bogor Extensible Model Checking Framework
Model checking has proven to be an effective technology for verification and debugging in hardware and more recently in software domains. We believe that recent trends in both th...
Matthew B. Dwyer, John Hatcliff, Matthew Hoosier, ...
CHI
2002
ACM
14 years 8 months ago
In your own words: using full sentences as feedback
Many applications have cluttered dialogs that require users to make complicated settings. Some settings even determine the availability and state of other settings, creating inter...
Jacob O. Wobbrock
ICCV
2001
IEEE
14 years 10 months ago
Cloning Your Own Face with a Desktop Camera
: We have developed an easy and cost-effective system that constructs textured 3D animated face models from videos with minimal user interaction. Our system first takes, with an or...
Zhengyou Zhang, Zicheng Liu, Dennis Adler, Michael...
CEAS
2008
Springer
13 years 10 months ago
Global-scale Anti-spam Testing in Your Own Back Yard
The effectiveness of anti-spam techniques is an important question: after all, spam has a real cost to legitimate users in terms of time and resources. The problem is how we deter...
Margaret Nielsen, Dane Bertram, Sampson Pun, John ...
PUC
2000
114views more  PUC 2000»
13 years 8 months ago
Magic Wardrobe: Situated Shopping from your own Bedroom
In this paper, we describe a research prototype, called MAGIC WARDROBE, which serves as a physical interface between the consumer and the online marketplace. This new kind of wardr...
Dadong Wan