Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
The trend toward pervasive computing necessitates finding and implementing appropriate ways for users to interact with devices. We believe the future of interaction with pervasive ...
Paul P. Maglio, Teenie Matlock, Christopher S. Cam...
The Virtual Window system uses head movements in a local office to control camera movement in a remote office. The result is like a window allowing exploration of remote scenes ra...
Software development environments are examples of complex computer applications characterized by heterogeneity; they are composed of diverse information repositories, user interfa...
Web Modeling Language (WebML, http://webml.org) is a notation for visually specifying complex Web sites at the conceptual level. All the concepts of WebML are specified both graph...