Sciweavers

310 search results - page 28 / 62
» Why Delannoy numbers
Sort
View
AIHC
2007
Springer
14 years 4 months ago
Gaze-X: Adaptive, Affective, Multimodal Interface for Single-User Office Scenarios
This paper describes an intelligent system that we developed to support affective multimodal human-computer interaction (AMM-HCI) where the user’s actions and emotions are modele...
Ludo Maat, Maja Pantic
FASE
2007
Springer
14 years 4 months ago
Measuring and Characterizing Crosscutting in Aspect-Based Programs: Basic Metrics and Case Studies
Aspects are defined as well-modularized crosscutting concerns. Despite being a core tenet of Aspect Oriented Programming, little research has been done in characterizing and measur...
Roberto E. Lopez-Herrejon, Sven Apel
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
14 years 2 months ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson
CAV
2006
Springer
95views Hardware» more  CAV 2006»
14 years 1 months ago
Yasm: A Software Model-Checker for Verification and Refutation
Example Guided Abstraction Refinement (CEGAR) [6] framework. A number of wellengineered software model-checkers are available, e.g., SLAM [1] and BLAST [12]. Why build another one?...
Arie Gurfinkel, Ou Wei, Marsha Chechik
WWW
2007
ACM
14 years 10 months ago
Exposing private information by timing web applications
We show that the time web sites take to respond to HTTP requests can leak private information, using two different types of attacks. The first, direct timing, directly measures re...
Andrew Bortz, Dan Boneh