Sciweavers

7404 search results - page 1411 / 1481
» Software performance antipatterns
Sort
View
SACMAT
2006
ACM
15 years 10 months ago
Traust: a trust negotiation-based authorization service for open systems
In recent years, trust negotiation (TN) has been proposed as a novel access control solution for use in open system environments in which resources are shared across organizationa...
Adam J. Lee, Marianne Winslett, Jim Basney, Von We...
UIST
2006
ACM
15 years 10 months ago
CueTIP: a mixed-initiative interface for correcting handwriting errors
With advances in pen-based computing devices, handwriting has become an increasingly popular input modality. Researchers have put considerable effort into building intelligent rec...
Michael Shilman, Desney S. Tan, Patrice Simard
UIST
2006
ACM
15 years 10 months ago
Phosphor: explaining transitions in the user interface using afterglow effects
Sometimes users fail to notice a change that just took place on their display. For example, the user may have accidentally deleted an icon or a remote collaborator may have change...
Patrick Baudisch, Desney S. Tan, Maxime Collomb, D...
VRST
2006
ACM
15 years 10 months ago
Interactive modelling and tracking for mixed and augmented reality
Some tasks vital to many mixed and augmented reality systems are either too time consuming or complex to be carried out whilst the system is active. 3D scene modelling and labelli...
R. Freeman, A. Steed
ACSAC
2005
IEEE
15 years 10 months ago
Automated and Safe Vulnerability Assessment
As the number of system vulnerabilities multiplies in recent years, vulnerability assessment has emerged as a powerful system security administration tool that can identify vulner...
Fanglu Guo, Yang Yu, Tzi-cker Chiueh
« Prev « First page 1411 / 1481 Last » Next »