Sciweavers

804 search results - page 96 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
TOCHI
1998
89views more  TOCHI 1998»
15 years 4 months ago
Using Metalevel Techniques in a Flexible Toolkit for CSCW Applications
Ideally, software toolkits for collaborative applications should provide generic, reusable components, applicable in a wide range of circumstances, which software developers can as...
Paul Dourish
137
Voted
ECOOP
2007
Springer
15 years 10 months ago
MAO: Ownership and Effects for More Effective Reasoning About Aspects
Abstract. Aspect-oriented advice increases the number of places one must consider during reasoning, since advice may affect all method calls and field accesses. MAO, a new variant...
Curtis Clifton, Gary T. Leavens, James Noble
139
Voted
TROB
2002
132views more  TROB 2002»
15 years 4 months ago
Performance of a distributed robotic system using shared communications channels
We have designed and built a set of miniature robots called Scouts and have developed a distributed software system to control them. This paper addresses the fundamental choices we...
Paul E. Rybski, Sascha Stoeter, Maria L. Gini, Dea...
TEDU
2008
213views Education» more  TEDU 2008»
15 years 3 months ago
TMAR: Extension of a Tabletop Interface Using Mobile Augmented Reality
Recently, many researchers have worked on tabletop systems. One issue with tabletop interfaces is how to control the table without using conventional desktop input devices such as ...
Sewon Na, Mark Billinghurst, Woontack Woo
WWW
2002
ACM
16 years 5 months ago
A web-based resource migration protocol using WebDAV
The web's hyperlinks are notoriously brittle, and break whenever a resource migrates. One solution to this problem is a transparent resource migration mechanism, which separa...
Michael P. Evans, Steven Furnell