Sciweavers

1235 search results - page 214 / 247
» The Designers' Notepad: Supporting and Understanding Coopera...
Sort
View
ICSE
1995
IEEE-ACM
14 years 1 days ago
Reverse Engineering of Legacy Code Exposed
— Reverse engineering of large legacy software systems generally cannot meet its objectives because it cannot be cost-effective. There are two main reasons for this. First, it is...
Bruce W. Weide, Wayne D. Heym, Joseph E. Hollingsw...
WSC
2007
13 years 10 months ago
Building composable bridges between the conceptual space and the implementation space
Often the process and effort in building interoperable Command and Control (C2) systems and simulations can be arduous. Invariably the difficulty is in understanding what is inten...
Paul Gustavson, Tram Chase
CRITICAL
2005
13 years 10 months ago
Affect: from information to interaction
While affective computing explicitly challenges the primacy of rationality in cognitivist accounts of human activity, at a deeper level it relies on and reproduces the same inform...
Kirsten Boehner, Rogério de Paula, Paul Dou...
ACSW
2007
13 years 10 months ago
The motivation and proposition of a privacy-enhancing architecture for operational databases
To date, research has focussed on privacy from a wide perspective, enabling organisations to implement various technologies that contribute to privacy protection. However, in such...
Kirsten Wahlstrom, Gerald Quirchmayr
BCSHCI
2008
13 years 10 months ago
Creating creative processes: a workshop demonstrating a methodological approach for subjects between the sciences and the arts
There is a lack of `explicit education' of different modes of creativity and different methodologies for initiating creative processes. This is important for not only art pra...
Carola Boehm