Sciweavers

2503 search results - page 452 / 501
» Building Computer Network Attacks
Sort
View
CHI
1992
ACM
14 years 1 months ago
Portholes: Supporting Awareness in a Distributed Work Group
We are investigating ways in which media space technologies can support distributed work groups through access to information that supports general awareness. Awareness involves k...
Paul Dourish, Sara A. Bly
ECOOPW
1998
Springer
14 years 1 months ago
Role-Based Protection and Delegation for Mobile Object Environments
PrincipalDomain is an administrative scoping construct for establishing security policies based on the principals invoking object services that may entail objects moving around a ...
Nataraj Nagaratnam, Doug Lea
DPPI
2007
ACM
14 years 1 months ago
Exploring design concepts for sharing experiences through digital photography
In this research, we aim to explore meaningful design directions for future photography applications with a focus on the experiences around sharing. We review a wide-rage of photo-...
Heekyoung Jung, Kay Connelly
AUIC
2004
IEEE
14 years 25 days ago
Dogs or Robots - Why do Children See Them as Robotic Pets Rather Than Canine Machines?
In the not too distant future Intelligent Creatures (robots, smart devices, smart vehicles, smart buildings, etc) will share the everyday living environment of human beings. It is...
Brendan Bartlett, Vladimir Estivill-Castro, Stuart...
DEBS
2010
ACM
14 years 12 days ago
Magnet: practical subscription clustering for Internet-scale publish/subscribe
An effective means for building Internet-scale distributed applications, and in particular those involving group-based information sharing, is to deploy peer-to-peer overlay netwo...
Sarunas Girdzijauskas, Gregory Chockler, Ymir Vigf...