Sciweavers

1818 search results - page 299 / 364
» How users use access control
Sort
View
OOPSLA
1987
Springer
14 years 1 months ago
Metaclasses are First Class: the ObjVlisp Model
This paper shows how an attempt at a uniform and reflective definition resulted in an open-ended system supporting ObjVlisp, which we use to simulate object-oriented language exte...
Pierre Cointe
PERVASIVE
2011
Springer
13 years 1 months ago
Designing Shared Public Display Networks - Implications from Today's Paper-Based Notice Areas
Large public displays have become a regular conceptual element in many shops and businesses, where they advertise products or highlight upcoming events. In our work, we are interes...
Florian Alt, Nemanja Memarovic, Ivan Elhart, Domin...
CCS
2011
ACM
12 years 10 months ago
AmazonIA: when elasticity snaps back
Cloud Computing is an emerging technology promising new business opportunities and easy deployment of web services. Much has been written about the risks and benefits of cloud co...
Sven Bugiel, Stefan Nürnberger, Thomas Pö...
CHI
2007
ACM
14 years 10 months ago
Shallow-depth 3d interaction: design and evaluation of one-, two- and three-touch techniques
On traditional tables, people frequently use the third dimension to pile, sort and store objects. However, while effective and informative for organization, this use of the third ...
Mark S. Hancock, M. Sheelagh T. Carpendale, Andy C...
GLOBECOM
2009
IEEE
14 years 4 months ago
Graph-Based Approach for Enhancing Capacity and Fairness in Wireless Mesh Networks
—Wireless Mesh Networks have been an emerging technology in the past years. They are mainly used for providing last-mile broadband wireless access. It is then highly recommended ...
Salim Nahle, Naceur Malouch