Sciweavers

5722 search results - page 1039 / 1145
» Security Function Interactions
Sort
View
132
Voted
WADT
1999
Springer
15 years 6 months ago
From States to Histories
Based on the FOCUS theory of distributed systems (see [Broy, Stølen 01]) that are composed of interacting components we introduce a formal model of services and layered architectu...
Manfred Broy
111
Voted
CHI
1997
ACM
15 years 6 months ago
Elastic Windows: Evaluation of Multi-Window Operations
Most windowing systems follow the independent overlapping windows approach, which emerged as an answer to the needs of the 1980s’ technology. Due to advances in computers and di...
Eser Kandogan, Ben Shneiderman
116
Voted
CHI
1997
ACM
15 years 6 months ago
The Amulet User Interface Development Environment
—The Amulet user interface development environment makes it easier for programmers to create highly-interactive, graphical user interface software for Unix, Windows and the Macin...
Brad A. Myers, Richard G. McDaniel, Robert C. Mill...
CHI
1996
ACM
15 years 6 months ago
Email Overload: Exploring Personal Information Management of Email
Email is one of the most successful computer applications yet devised. Our empirical data show however, that although email was originally designed as a communications application...
Steve Whittaker, Candace L. Sidner
CHI
2009
ACM
15 years 6 months ago
Hyperlinking reality via camera phones
Mobile vision services are a type of mobile ITS applications that emerge with increased miniaturization of sensor and computing devices, such as in camera equipped mobile phones, ...
Dusan Omercevic, Ales Leonardis
« Prev « First page 1039 / 1145 Last » Next »