Sciweavers

4445 search results - page 11 / 889
» Reflective Authorization Systems
Sort
View
HICSS
1996
IEEE
139views Biometrics» more  HICSS 1996»
14 years 2 months ago
Strictly Class-Based Modeling Considered Harmful
Many object-oriented methods have assumed classbased approaches, without considering prototype-based ones. Some authors, while admitting prototypes as a useful concept, only envis...
Birgitte Krogh, Sean Levy, Allen H. Dutoit, Eswara...
CHI
2009
ACM
14 years 10 months ago
Reflections of everyday activities in spending data
In this paper we show that financial information can be used to sense many aspects of human activity. This simple technique gives people information about their daily lives, is ea...
Julia Schwarz, Jennifer Mankoff, H. Scott Matthews
ACMDIS
2006
ACM
14 years 3 months ago
The history tablecloth: illuminating domestic activity
The History Tablecloth is a flexible substrate screen-printed with electroluminescent material forming a grid of lace-like elements. When objects are left on the table, cells bene...
William W. Gaver, John Bowers, Andy Boucher, Andy ...
ICSE
2009
IEEE-ACM
13 years 7 months ago
Reflecting on self-adaptive software systems
Self-adaptability has been proposed as an effective approach to automate the complexity associated with the management of modern-day software systems. While over the past decade w...
Jesper Andersson, Rogério de Lemos, Sam Mal...
MMS
2010
13 years 8 months ago
Asynchronous reflections: theory and practice in the design of multimedia mirror systems
-- In this paper, we present a theoretical framing of the functions of a mirror by breaking the synchrony between the state of a reference object and its reflection. This framing p...
Wei Zhang, Bo Begole, Maurice Chu