Sciweavers

3395 search results - page 529 / 679
» Designs, Disputes and Strategies
Sort
View
CHIMIT
2007
ACM
14 years 1 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
CHINZ
2007
ACM
14 years 1 months ago
Using a mobile phone for 6 DOF mesh editing
This paper describes how a mobile phone can be used as a six degree of freedom interaction device for 3D mesh editing. Using a video see-through Augmented Reality approach, the mo...
Anders Henrysson, Mark Billinghurst
ECOOP
2007
Springer
14 years 1 months ago
AS-GC: An Efficient Generational Garbage Collector for Java Application Servers
Abstract. A generational collection strategy utilizing a single nursery cannot efficiently manage objects in application servers due to variance in their lifespans. In this paper, ...
Feng Xian, Witawas Srisa-an, ChengHuan Jia, Hong J...
CANDT
2009
14 years 1 months ago
Please help!: patterns of personalization in an online tech support board
We analyze help-seeking strategies in two large tech support boards and observe a number of previously unreported differences between tech support boards and other types of online...
Sarita Yardi, Erika Shehan Poole
ERLANG
2007
ACM
14 years 1 months ago
An Erlang framework for autonomous mobile robots
This paper presents an Erlang-based framework, developed by the authors, for the realisation of software systems for autonomous mobile robots. On the basis of the analysis of the ...
Corrado Santoro