Sciweavers

26354 search results - page 99 / 5271
» How we refactor, and how we know it
Sort
View
USENIX
2001
13 years 11 months ago
Heimdal and Windows 2000 Kerberos - How to Get Them to Play Together
As a practical means of achieving better security and single sign-on, the Kerberos network authentication system has been in wide use in the Unix world for many years. Microsoft h...
Assar Westerlund, Johan Danielsson
DKE
2006
99views more  DKE 2006»
13 years 10 months ago
How to act on inconsistent news: Ignore, resolve, or reject
Inconsistencies frequently occur in news about the real-world. Some of these inconsistencies may be more significant than others, and some news may contain more inconsistencies th...
Anthony Hunter
SIGIR
2008
ACM
13 years 10 months ago
How medical expertise influences web search interaction
Domain expertise can have an important influence on how people search. In this poster we present findings from a log-based study into how medical domain experts search the Web for...
Ryen W. White, Susan T. Dumais, Jaime Teevan
CHI
2007
ACM
14 years 10 months ago
Soap: how to make a mouse work in mid-air
Computer mice do not work in mid air. The reason is that a mouse is really only half an input device--the other half being the surface the mouse is operated on, such as a mouse pa...
Patrick Baudisch, Mike Sinclair, Andrew Wilson
HRI
2010
ACM
14 years 5 months ago
Showing robots how to follow people using a broomstick interface
—Robots are poised to enter our everyday environments such as our homes and offices, contexts that present unique questions such as the style of the robot’s actions. Style-orie...
James Everett Young, Kentaro Ishii, Takeo Igarashi...