Sciweavers

4445 search results - page 10 / 889
» Reflective Authorization Systems
Sort
View
CSCW
2012
ACM
12 years 5 months ago
See friendship, sort of: how conversation and digital traces might support reflection on friendships
Inspired by conversational visualization tools and the increasing enactment of relationships in social media, we examine how people reflect on friendships and how social data and ...
Victoria Schwanda Sosik, Xuan Zhao, Dan Cosley
ESORICS
2000
Springer
14 years 1 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
COOTS
2001
13 years 11 months ago
Kava - Using Byte code Rewriting to add Behavioural Reflection to Java
Many authors have proposed using byte code rewriting as a way of adapting or extending the behaviour of Java There are toolkits available that simplify this process and raise the ...
Ian Welch, Robert J. Stroud
HT
2005
ACM
14 years 3 months ago
Activity links: supporting communication and reflection about action
Tasks that take place over a long period of time or collaborative tasks where participants are required to develop an understanding of each other’s effort benefit from better co...
Hao-wei Hsieh, Frank M. Shipman III