Sciweavers

3095 search results - page 594 / 619
» Ubiquitous presence systems
Sort
View
CHI
2010
ACM
14 years 3 months ago
Embodied social proxy: mediating interpersonal connection in hub-and-satellite teams
Current business conditions have given rise to distributed teams that are mostly collocated except for one remote member. These “hub-and-satellite” teams face the challenge of...
Gina Venolia, John C. Tang, Ruy Cervantes, Sara Bl...
PLDI
2009
ACM
14 years 3 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
ICST
2009
IEEE
14 years 3 months ago
Predicting Attack-prone Components
GEGICK, MICHAEL CHARLES. Predicting Attack-prone Components with Source Code Static Analyzers. (Under the direction of Laurie Williams). No single vulnerability detection techniqu...
Michael Gegick, Pete Rotella, Laurie A. Williams
ECTEL
2009
Springer
14 years 3 months ago
Distributed Awareness for Class Orchestration
The orchestration process consists of managing classroom interactions at multiple levels: individual activities, teamwork and class-wide sessions. We study the process of orchestra...
Hamed S. Alavi, Pierre Dillenbourg, Fréd&ea...
MIDDLEWARE
2009
Springer
14 years 3 months ago
DR-OSGi: Hardening Distributed Components with Network Volatility Resiliency
Abstract. Because middleware abstractions remove the need for lowlevel network programming, modern distributed component systems expose network volatility (i.e., frequent but inter...
Young-Woo Kwon, Eli Tilevich, Taweesup Apiwattanap...