Sciweavers

1818 search results - page 307 / 364
» How users use access control
Sort
View
110
Voted
CHI
2005
ACM
16 years 3 months ago
Distributed display environments
Augmented reality makes it possible to visualize information directly within the context of the real world by overlaying virtual graphics. We use the term view management to refer...
Dugald Ralph Hutchings, John T. Stasko, Mary Czerw...
124
Voted
SI3D
1997
ACM
15 years 6 months ago
Attention and Visual Feedback: The Bimanual Frame of Reference
We investigate the synergy of the two hands for virtual object manipulation. We report results from an experiment which suggest that the two hands together provide sufficient per...
Ken Hinckley, Randy F. Pausch, Dennis Proffitt
RTSS
2008
IEEE
15 years 9 months ago
Predictable Interrupt Management and Scheduling in the Composite Component-Based System
This paper presents the design of user-level scheduling hierarchies in the Composite component-based system. The motivation for this is centered around the design of a system that...
Gabriel Parmer, Richard West
131
Voted
SOQUA
2007
15 years 3 months ago
ConTest listeners: a concurrency-oriented infrastructure for Java test and heal tools
With the proliferation of the new multi-core personal computers, and the explosion of the usage of highly concurrent machine configuration, concurrent code moves from being writt...
Yarden Nir-Buchbinder, Shmuel Ur
115
Voted
AINA
2007
IEEE
15 years 9 months ago
Cost-Function-Based Network Selection Strategy in Integrated Wireless and Mobile Networks
—Wireless and mobile networks have experienced great success over the past few years. However, any single type of wireless and mobile network cannot provide all types of services...
Wei Shen, Qing-An Zeng