Sciweavers

4340 search results - page 676 / 868
» Designing for change
Sort
View
ACMSE
1995
ACM
15 years 8 months ago
Database management for multimedia distributed collaborative writing
{ Traditional computer applications have been designed to be run by one user at a time who does some work in a single medium, such as ASCII text, and very little regard has been gi...
A. Wesley Wear, Yu Gong, Kai H. Chang
CHI
1995
ACM
15 years 8 months ago
User Embodiment in Collaborative Virtual Environments
This paper explores the issue of user embodiment within collaborative virtual environments. By user embodiment we mean the provision of users with appropriate body images so as to...
Steve Benford, John Bowers, Lennart E. Fahlé...
ICSE
1995
IEEE-ACM
15 years 8 months ago
Reverse Engineering of Legacy Code Exposed
— Reverse engineering of large legacy software systems generally cannot meet its objectives because it cannot be cost-effective. There are two main reasons for this. First, it is...
Bruce W. Weide, Wayne D. Heym, Joseph E. Hollingsw...
STOC
1995
ACM
107views Algorithms» more  STOC 1995»
15 years 8 months ago
Incremental cryptography and application to virus protection
The goal of incremental cryptography is to design cryptographic algorithms with the property that having applied the algorithm to a document, it is possible to quickly update the ...
Mihir Bellare, Oded Goldreich, Shafi Goldwasser
CHI
2010
ACM
15 years 8 months ago
Push-and-pull switching: window switching based on window overlapping
We propose Push-and-Pull Switching, a window switching technique using window overlapping to implicitly define groups. Push-and-Pull Switching enables switching between groups and...
Quan Xu, Géry Casiez