Sciweavers

1818 search results - page 327 / 364
» How users use access control
Sort
View
CHI
2008
ACM
14 years 9 months ago
Sigma lenses: focus-context transitions combining space, time and translucence
Focus + context techniques such as fisheye lenses are used to navigate and manipulate objects in multi-scale worlds. They provide in-place magnification of a region without requir...
Emmanuel Pietriga, Caroline Appert
IEEEAMS
2003
IEEE
14 years 2 months ago
Service Morphing: Integrated System- and Application-Level Service
Service morphing is a set of techniques used to continuously meet an application’s Quality of Service (QoS) needs, in the presence of run-time variations in service locations, p...
Christian Poellabauer, Karsten Schwan, Sandip Agar...
DAGSTUHL
1993
13 years 10 months ago
Supporting continuous media applications in a micro-kernel environment
Currently, popular operating systems are unable to support the end-toend real-time requirements of distributed continuous media. Furthermore, the integration of continuous media c...
Geoff Coulson, Gordon S. Blair, Philippe Robin, Do...
NRHM
2008
93views more  NRHM 2008»
13 years 9 months ago
Semantics on demand: Can a Semantic Wiki replace a knowledge base?
In the same way that Wikis have become the mechanism that has enabled groups of users to collaborate on the production of hypertexts on the web, Semantic Wikis promise a future of...
David E. Millard, Chris Bailey, Philip Boulain, Sw...
IMR
2003
Springer
14 years 2 months ago
An Adaptable Surface Parameterization Method
Parameterizations of triangulated surfaces are used in an increasing number of mesh processing applications for various purposes. Although demands vary, they are often required to...
Patrick Degener, Jan Meseth, Reinhard Klein