Sciweavers

26354 search results - page 185 / 5271
» How we refactor, and how we know it
Sort
View
GROUP
2003
ACM
14 years 4 months ago
How people use orientation on tables: comprehension, coordination and communication
In order to support co-located collaboration, many researchers are now investigating how to effectively augment tabletops with electronic displays. As far back as 1988, orientatio...
Russell Kruger, M. Sheelagh T. Carpendale, Stacey ...

Publication
317views
15 years 8 months ago
A Detailed Analysis of How an Urban Trail System Affects the Travel of Cyclists
Transportation specialists, urban planners, and public health officials have been steadfast in encouraging active modes of transportation over the past decades. Conventional thin...
Kevin J. Krizek, Ahmed El-Geneidy, Kristin Thompso...
CTW
2007
121views more  CTW 2007»
13 years 10 months ago
Regularly irregular: how groups reconcile cross-cutting agendas and demand in healthcare
Abstract The flow of technical work in acute healthcare varies unpredictably, in patterns that occur regularly enough that they can be managed. Acute care organizations develop wa...
Christopher P. Nemeth, Mark Nunnally, Michael F. O...
WWW
2004
ACM
14 years 11 months ago
How to make a semantic web browser
Two important architectural choices underlie the success of the Web: numerous, independently operated servers speak a common protocol, and a single type of client--the Web browser...
D. A. Quan, R. Karger
ACSAC
2009
IEEE
14 years 5 months ago
How to Securely Break into RBAC: The BTG-RBAC Model
—Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on ...
Ana Ferreira, David W. Chadwick, Pedro Farinha, Ri...