Sciweavers

19 search results - page 3 / 4
» From Undo to Multi-User Applications
Sort
View
TKDE
2002
67views more  TKDE 2002»
13 years 7 months ago
Recovery from Malicious Transactions
Preventive measures sometimes fail to deflect malicious attacks. In this paper, we adopt an information warfare perspective, which assumes success by the attacker in achieving part...
Paul Ammann, Sushil Jajodia, Peng Liu
VLDB
2004
ACM
111views Database» more  VLDB 2004»
14 years 24 days ago
Lifting the Burden of History from Adaptive Query Processing
Adaptive query processing schemes attempt to reoptimize query plans during the course of query execution. A variety of techniques for adaptive query processing have been proposed,...
Amol Deshpande, Joseph M. Hellerstein
CHI
2002
ACM
14 years 7 months ago
User activity histories
Current software interfaces fail to incorporate historical data from user interaction into their design. While some systems exhibit a minimalist use of history in the form of undo...
Etienne Pelaprat, R. Benjamin Shapiro
AVI
2006
13 years 9 months ago
Enabling interaction with single user applications through speech and gestures on a multi-user tabletop
Co-located collaborators often work over physical tabletops with rich geospatial information. Previous research shows that people use gestures and speech as they interact with art...
Edward Tse, Chia Shen, Saul Greenberg, Clifton For...
SRDS
2003
IEEE
14 years 22 days ago
Preventing Orphan Requests in the Context of Replicated Invocation
In today’s systems, applications are composed from various components that may be located on different machines. The components (acting as servers) may have to collaborate in or...
Stefan Pleisch, Arnas Kupsys, André Schiper