Sciweavers

3815 search results - page 41 / 763
» An Implementation of Session Types
Sort
View
USENIX
2003
13 years 9 months ago
Checkpoints of GUI-based Applications
We describe a new system, called guievict, that enables the graphical user interface (GUI) of any application to be transparently migrated to or replicated on another display with...
Victor C. Zandy, Barton P. Miller
NCA
2007
IEEE
14 years 2 months ago
FRAC: Implementing Role-Based Access Control for Network File Systems
We present FRAC, a Framework for Role-based Access Control in network file systems. FRAC is a reference monitor that controls the message flow between file system clients and s...
Aniruddha Bohra, Stephen Smaldone, Liviu Iftode
SIGCOMM
2010
ACM
13 years 8 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long
ICALT
2006
IEEE
14 years 1 months ago
A Platform for CSCL Practice and Dissemination
CSCL practice and dissemination are problematic due to the lack of technical and pedagogical expertise, concrete training, and support for teachers. This paper describes a technol...
Jacques Lonchamp
HCI
2007
13 years 9 months ago
Computer-Supported Creativity: Evaluation of a Tabletop Mind-Map Application
The aim of this study is to investigate the usability and usefulness of interactive tabletop technologies to support group creativity. We implemented a tabletop interface enabling ...
Stéphanie Buisine, Guillaume Besacier, Mari...