Sciweavers

1352 search results - page 248 / 271
» Software Architecture and Software Configuration Management
Sort
View
ACSW
2003
13 years 9 months ago
A Secure Pervasive Environment
This paper explores the complications encountered when attempting to create a secure pervasive computing environment. The model introduced in this paper is primarily conceptual. T...
Patrick G. McLean
FLAIRS
2001
13 years 9 months ago
An Intelligent Interface for Keyboard and Mouse Control -- Providing Full Access to PC Functionality via Speech
SUITEKeys is a speech user interface for motor-disabled computer users. This interface provides access to all available functionality of a computer by modeling interaction at the ...
Bill Z. Manaris, Renée A. McCauley, Valanne...
KYOTODL
2000
87views more  KYOTODL 2000»
13 years 9 months ago
Modeling Customizable Web Applications
The web is more and more used as a platform for fullfledged, increasingly complex applications, where a huge amount of change-intensive data is managed by underlying database syst...
Gerti Kappel, Werner Retschitzegger, Wieland Schwi...
CIDR
2009
133views Algorithms» more  CIDR 2009»
13 years 8 months ago
Principles for Inconsistency
Data consistency is very desirable because strong semantic properties make it easier to write correct programs that perform as users expect. However, there are good reasons why co...
Shel Finkelstein, Dean Jacobs, Rainer Brendle
ICDCSW
2007
IEEE
13 years 7 months ago
A Middleware Support for Agent-Based Application Mobility in Pervasive Environments
—Application mobility is an efficient way to mask uneven conditioning and reduce users’ distractions in pervasive environments. However, since mobility brings more dynamism and...
Yu Zhou, Jiannong Cao, Vaskar Raychoudhury, Joanna...