Sciweavers

4688 search results - page 887 / 938
» Dynamics of Control
Sort
View
115
Voted
CHI
2009
ACM
16 years 3 months ago
An evaluation of coordination techniques for protecting objects and territories in tabletop groupware
Indirect input techniques allow users to quickly access all parts of tabletop workspaces without the need for physical access; however, indirect techniques restrict the available ...
David Pinelle, Mutasem Barjawi, Miguel A. Nacenta,...
117
Voted
PPOPP
2009
ACM
16 years 3 months ago
Safe open-nested transactions through ownership
Researchers in transactional memory (TM) have proposed open nesting as a methodology for increasing the concurrency of transactional programs. The idea is to ignore "low-leve...
Kunal Agrawal, I.-Ting Angelina Lee, Jim Sukha
114
Voted
TCC
2009
Springer
132views Cryptology» more  TCC 2009»
16 years 3 months ago
Authenticated Adversarial Routing
: The aim of this paper is to demonstrate the feasibility of authenticated throughput-ecient routing in an unreliable and dynamically changing synchronous network in which the majo...
Yair Amir, Paul Bunn, Rafail Ostrovsky
112
Voted
CHI
2006
ACM
16 years 2 months ago
Providing support for adaptive scripting in an on-line collaborative learning environment
This paper describes results from a series of experimental studies to explore issues related to structuring productive group dynamics for collaborative learning using an adaptive ...
Carolyn Penstein Rosé, Gahgene Gweon, Regan...
115
Voted
CHI
2005
ACM
16 years 2 months ago
Who gets to know what when: configuring privacy permissions in an awareness application
We report on a study (N=36) of user preferences for balancing awareness with privacy. Participants defined permissions for sharing of location, availability, calendar information ...
Sameer Patil, Jennifer Lai