Sciweavers

1963 search results - page 287 / 393
» How is aliasing used in systems software
Sort
View
CSFW
2006
IEEE
14 years 3 months ago
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rule...
Michael J. May, Carl A. Gunter, Insup Lee
LCTRTS
2005
Springer
14 years 2 months ago
Generation of permutations for SIMD processors
Short vector (SIMD) instructions are useful in signal processing, multimedia, and scientific applications. They offer higher performance, lower energy consumption, and better res...
Alexei Kudriavtsev, Peter M. Kogge
UIST
2000
ACM
14 years 1 months ago
Jazz: an extensible zoomable user interface graphics toolkit in Java
In this paper we investigate the use of scene graphs as a general approach for implementing two-dimensional (2D) graphical applications, and in particular Zoomable User Interfaces...
Benjamin B. Bederson, Jon Meyer, Lance Good
UIST
2000
ACM
14 years 1 months ago
A temporal model for multi-level undo and redo
A number of recent systems have provided rich facilities for manipulating the timelines of applications. Such timelines represent the history of an application’s use in some ses...
W. Keith Edwards, Takeo Igarashi, Anthony LaMarca,...
HT
1998
ACM
14 years 1 months ago
Link services or link agents?
A general link service for the WWW has been used within an Electronic Libraries’ project. Experience using it shows that as the links become increasingly interesting to the user...
Les Carr, Wendy Hall, Steve Hitchcock