Sciweavers

708 search results - page 107 / 142
» Implementing access control to people location information
Sort
View
SIGUCCS
2003
ACM
14 years 29 days ago
Regaining single sign-on taming the beast
It has been our effort at Ringling school to provide our campus community with the capability to uniformly access resources across multiple platforms. Empowering the user with a s...
Divyangi Anchan, Mahmoud Pegah
CHI
2001
ACM
14 years 8 months ago
Listen reader: an electronically augmented paper-based book
While predictions abound that electronic books will supplant traditional paper-based books, many people bemoan the coming loss of the book as cultural artifact. In this project we...
Maribeth Back, Jonathan Cohen, Rich Gold, Steve R....
HRI
2010
ACM
14 years 2 months ago
Lead me by the hand: evaluation of a direct physical interface for nursing assistant robots
—When a user is in close proximity to a robot, physical contact becomes a potentially valuable channel for communication. People often use direct physical contact to guide a pers...
Tiffany L. Chen, Charles C. Kemp
CAV
2007
Springer
111views Hardware» more  CAV 2007»
13 years 11 months ago
Verification Across Intellectual Property Boundaries
In many industries, the share of software components provided by third-party suppliers is steadily increasing. As the suppliers seek to secure their intellectual property (IP) righ...
Sagar Chaki, Christian Schallhart, Helmut Veith
ICSEA
2008
IEEE
14 years 2 months ago
Reuse through Requirements Traceability
The Reuse of code artefacts can make development quicker, cheaper and more robust, but the process is complex and has many pitfalls: Code artefacts must exist, be available, be fo...
Rob Pooley, Craig Warren