Filters








21,973 Hits in 5.3 sec

On the Monitorability of Session Types, in Theory and Practice [article]

Christian Batrolo Burlò, Adrian Francalanza, Alceste Scalas
2021 arXiv   pre-print
This work takes a fresh look at the run-time verification of communicating systems using session types, in theory and in practice.  ...  On the theoretical side, we develop a novel formal model of session-monitored processes; with it, we formulate and prove new results on the monitorability of session types, connecting their run-time and  ...  Our plan is to study more instances of C, T and M -both in theory, and in practice.  ... 
arXiv:2105.06291v1 fatcat:wpy4l4tf3rhqhhqgyzbohtrcbu

On the Monitorability of Session Types, in Theory and Practice

Christian Bartolo Burlò, Adrian Francalanza, Alceste Scalas, Manu Sridharan, Anders Møller
2021
This work takes a fresh look at the run-time verification of communicating systems using session types, in theory and in practice.  ...  We then use this model to formulate and prove new results on the monitorability of session types, defined in terms of soundness (i.e., whether monitors only flag ill-typed processes) and completeness (  ...  For all session types S and processes P , if there exists a trace t such that ⟨P ; [[S]]⟩ t E C O O P 2 0 2 1 20:14 On the Monitorability of Session Types, in Theory and Practice ∅ · ∅ ⊢ P : S  ... 
doi:10.4230/lipics.ecoop.2021.20 fatcat:vgpoyktmzvbzvjbrxoawsjdski

Toward Realistic and Artifact-Free Insider-Threat Data

Kevin S. Killourhy, Roy A. Maxion
2007 Proceedings of the Computer Security Applications Conference  
Since these two sanitization strategies are commonly used in practice, we must be concerned about the consequences of sanitization artifacts on insider-threat research.  ...  We compare the results of the evaluation using raw data to the results using each of three types of sanitized data, and we measure the effect of each sanitization strategy.  ...  The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of any sponsoring institution  ... 
doi:10.1109/acsac.2007.4412979 fatcat:i5atodiphfebdmeagahbssvyi4

Toward Realistic and Artifact-Free Insider-Threat Data

Kevin S. Killourhy, Roy A. Maxion
2007 Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)  
Since these two sanitization strategies are commonly used in practice, we must be concerned about the consequences of sanitization artifacts on insider-threat research.  ...  We compare the results of the evaluation using raw data to the results using each of three types of sanitized data, and we measure the effect of each sanitization strategy.  ...  The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of any sponsoring institution  ... 
doi:10.1109/acsac.2007.31 dblp:conf/acsac/KillourhyM07 fatcat:w5zgixgdyzft5boqyyr7ftclmy

Video artifacts for design

Wendy E. Mackay, Anne V. Ratzer, Paul Janecek
2000 Proceedings of the conference on Designing interactive systems processes, practices, methods, and techniques - DIS '00  
in real-world work practices.  ...  Our video artifacts act as both the output of one design activity and the input to the next. This reuse provides an efficient way to identify relevant material and apply it in later design phases.  ...  Another type of video analysis, based on activity theory, examined the focus shifts between the task at hand and the interface .  ... 
doi:10.1145/347642.347666 dblp:conf/ACMdis/MackayRJ00 fatcat:rdwc27njpjdaphbaqidqwnqnie

Knowledge work artifacts

Margaret Elliott, Mark S. Ackerman, Walt Scacchi
2007 Proceedings of the 2007 international ACM conference on Conference on supporting group work - GROUP '07  
Most empirical studies of peer production have focused on the final products of these efforts (such as software in Free/Open Source projects), but there are also many other knowledge artifacts that improve  ...  The paper presents two examples of the KCs' use in the project as well as an analysis of their benefits and costs.  ...  Les Gasser at UIUC; John Noll at Santa Clara University; and, Chris Jensen and others at the UCI Institute for Software Research are collaborators on the research described here.  ... 
doi:10.1145/1316624.1316650 dblp:conf/group/ElliottAS07 fatcat:bcoirwhe6zgddogl6t4w3r6ub4

A PRACTITIONER'S VIEW OF HUMAN–COMPUTER INTERACTION RESEARCH AND PRACTICE

Sabine Geldof, Joannes Vandermeulen
2007 Artifact  
These concepts, which grew out of a review of the research literature on models, theories, and frameworks in Human-Computer Interaction, are becoming part of Namahn's extended vocabulary, aimed at enhancing  ...  The initial methodological hypotheses on risk assessment and design rationale form the basis of its new methodology, which will be constructed in a bottom-up fashion based on case studies in the project's  ...  ACKNOWLEDGEMENTS This project is funded by IWOIB, the Institute Fostering Scientific Research and Innovation of the Brussels Region.  ... 
doi:10.1080/17493460701800181 fatcat:ucbanejyafe7pjwpizyslz5ugy

Risk Management Maturity Evaluation Artifact to Enhance Enterprise IT Quality

Misael Sousa de Araujo, Edgard Costa Oliveira, Simone Borges Simão Monteiro, Tharcísio Marcos Ferreira de Queiroz Mendonça
2017 Proceedings of the 19th International Conference on Enterprise Information Systems  
Due to the diversity of maturity models and their characteristics, this paper developed a comparative study between the main maturity models of the market, in which it was possible to define, with the  ...  help of the decision technique AHP -Analytic Hierarchy Process, the process evaluation model of COBIT 4.1 to measure risk management of IT maturity in modern enterprises.  ...  The second one is a selfassessment model with 2 sections: one session used to register quick results of the evaluation and a second session to register detailed results.  ... 
doi:10.5220/0006324404250432 dblp:conf/iceis/AraujoOMM17 fatcat:t37hztqbdffffebnyzloaemf3q

A Preliminary Model for Generating Experience Knowledge Based Artifacts

J. Kokkoniemi
2006 Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)  
This paper focuses on the knowledge management aspects of software inspection and presents a preliminary model for how artifacts can be developed so that their knowledge management based aspects are taken  ...  It has been proven to work in this context and there are indications that the model also works with other kinds of artifacts found within software engineering processes. .  ...  This work was supported by the Tauno Tönning Foundation and the Academy of Finland (under grant 74780).  ... 
doi:10.1109/hicss.2006.25 dblp:conf/hicss/Kokkoniemi06 fatcat:vgukz3rn6vdfzovpeetzb4ahga

Artifact awareness through screen sharing for distributed groups

Kimberly Tee, Saul Greenberg, Carl Gutwin
2009 International Journal of Human-Computer Studies  
Co-located collaborators can see the artifacts that others are working on, which in turn enables casual interactions.  ...  People see portions of others' screens in miniature, can selectively raise larger views of a screen to get more detail, and can engage in remote pointing.  ...  We thank our CB participants, who let us interview them about their CB practices.  ... 
doi:10.1016/j.ijhcs.2009.04.001 fatcat:hf46jbnozbdgdhujvzalgvm7d4

Toward a framework for ecologies of artifacts

Heekyoung Jung, Erik Stolterman, Will Ryan, Tonya Thompson, Marty Siegel
2008 Proceedings of the 5th Nordic conference on Human-computer interaction building bridges - NordiCHI '08  
We expect the knowledge of artifact ecology would help designers and researchers in the field of HCI to create and analyze interactive artifacts considering their dynamic interplays in an increasingly  ...  We conducted two types of studies -personal inventory study and an ecology map study -to explore multiple dimensions for understanding a personal ecology of artifacts.  ...  The types of labels and their relationships will be analyzed in the findings section.  ... 
doi:10.1145/1463160.1463182 dblp:conf/nordichi/JungSRTS08 fatcat:7eqcoqaybfhkvcxk5hht5np36m

Understanding physical activity through 3D printed material artifacts

Rohit Ashok Khot, Larissa Hjorth, Florian 'Floyd' Mueller
2014 Proceedings of the 32nd annual ACM conference on Human factors in computing systems - CHI '14  
For example, what types of affect do material artifacts, representing ones' physical activity create for the user?  ...  We found that the material artifacts made participants more conscious about their involvement in physical activity and illustrated different levels of engagement with the artifacts.  ...  Chad had a great physical workout session on one day of the study.  ... 
doi:10.1145/2556288.2557144 dblp:conf/chi/KhotHM14 fatcat:mblxhyfn65he3ggzn2t63yw7cq

All tibial foot: an electrophysiological artifact

G. AMOIRIDIS
1999 Journal of Neurology, Neurosurgery and Psychiatry  
He occasionally blurs the distinction between theories and established scientific fact forgetting that the practice of medicine and in particular the management of spinal disorders is full of paradoxes  ...  The mechanism of VCAP may be divided into some types, the paralytic type, the nonparalytic type, and these two combined type. 2 The first is possibly caused by loss of neurons in the nucleus ambiguus  ...  One in the Butterworth Heinmann series of Blue Books of Practical Neurology, it is attractively produced and reasonably well illustrated.  ... 
doi:10.1136/jnnp.67.5.698 pmid:10577043 pmcid:PMC1736629 fatcat:evscvod5djdaxo2awvutqzb3iq

A motion artifact generation and assessment system for the rapid testing of surface biopotential electrodes

Alper Cömert, Jari Hyttinen
2014 Physiological Measurement  
Acknowledgments The authors thank The Finnish Cultural Foundation (Pirkanmaa Fund) for its financial aid.  ...  Three theories on the origins of skin potentials are presented in a later paper by Vos et al (2003) .  ...  One experiment session of stage 1 comprised 18 segments and 1 session of stage 2 comprised 10 segments.  ... 
doi:10.1088/0967-3334/36/1/1 pmid:25500614 fatcat:5rzeltwaizhabm2hju5h33xc44

Cognitive artifacts as a window on design

John M. Carroll, Marcela Borge, Shin-I Shih
2013 Journal of Visual Languages and Computing  
In this paper, we analyze the artifacts and practices as a potential source of insight into how this problem solving activity could be supported by an interactive system design.  ...  The teams spontaneously created a variety of artifacts to hold and organize problem information, and practices to simplify and regularize their collaborative interactions around these artifacts.  ...  Acknowledgments We thank Craig Ganoe for help in designing the reference task and in planning this study.  ... 
doi:10.1016/j.jvlc.2013.05.001 fatcat:tdn55lcqxvhy7dicom2mi4usf4
« Previous Showing results 1 — 15 out of 21,973 results