Sciweavers

1009 search results - page 142 / 202
» Patterns, Tools and Models for Interaction Design
Sort
View
FASE
2008
Springer
14 years 3 days ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
SPAA
1993
ACM
14 years 2 months ago
Supporting Sets of Arbitrary Connections on iWarp Through Communication Context Switches
In this paper we introduce the ConSet communication model for distributed memory parallel computers. The communication needs of an application program can be satisfied by some ar...
Anja Feldmann, Thomas Stricker, Thomas E. Warfel
IUI
2006
ACM
14 years 4 months ago
Splitting rules for graceful degradation of user interfaces
This paper addresses the problem of the graceful degradation of user interfaces where an initial interface is transferred to a smaller platform. It presents a technique for pagina...
Murielle Florins, Francisco Montero Simarro, Jean ...
CHI
2000
ACM
14 years 2 months ago
HandSCAPE: a vectorizing tape measure for on-site measuring applications
We introduce HandSCAPE, an orientation-aware digital tape measure, as an input device for digitizing field measurements, and visualizing the volume of the resulting vectors with c...
Jay Lee, Victor Su, Sandia Ren, Hiroshi Ishii
ICLP
1995
Springer
14 years 1 months ago
Operational Semantics of Constraint Logic Programs with Coroutining
The semantics of constraint logic programming languages with coroutining facilities (\freeze," suspension, residuation, etc.) cannot be fully declarative; thus, an operationa...
Andreas Podelski, Gert Smolka