Sciweavers

UIST
1998
ACM
14 years 6 days ago
A Framework for Sharing Handwritten Notes
Richard C. Davis, James Lin, Jason A. Brotherton, ...
UIST
1998
ACM
14 years 6 days ago
Informative Things: How to Attach Information to the Real World
We describe a new method and implementation for managing information through the use of physical objects. In today’s networked world, the trend is toward working in a global vir...
Rob Barrett, Paul P. Maglio
UIST
1998
ACM
14 years 6 days ago
A Negotiation Architecture for Fluid Documents
The information presented in a document often consists of primary content as well as supporting material such as explanatory notes, detailed derivations, illustrations, and the li...
Bay-Wei Chang, Jock D. Mackinlay, Polle Zellweger,...
UIST
1998
ACM
14 years 6 days ago
Interactive Visualization of Serial Periodic Data
Serial periodic data exhibit both serial and periodic properties. For example, time continues forward serially, but weeks, months, and years are periods that recur. While there ar...
John V. Carlis, Joseph A. Konstan
SIGSOFT
1998
ACM
14 years 6 days ago
On-Line Change Mechanisms
Our interest in the eld of software architecture is focused on the application in technical systems, such as control systems. Our current research in this eld is centered around a...
Sylvia Stuurman, Jan van Katwijk
SIGSOFT
1998
ACM
14 years 6 days ago
Reengineering Class Hierarchies Using Concept Analysis
The design of a class hierarchy may be imperfect. For example, a class C may contain a member m not accessed in any C-instance, an indication that m could be eliminated, or moved ...
Gregor Snelting, Frank Tip
SIGSOFT
1998
ACM
14 years 6 days ago
Experiences in Improving Risk Management Processes Using the Concepts of the Riskit Method
CT This paper describes experiences from two organizations that have used the Riskit method for risk management in their software projects. This paper presents the Riskit method, t...
Jyrki Kontio, Gerhard Getto, Dieter Landes
SIGSOFT
1998
ACM
14 years 6 days ago
Reasoning about Implicit Invocation
Implicit invocation SN92, GN91] has become an important architectural style for large-scale system design and evolution. This paper addresses the lack of speci cation and veri cat...
David Garlan, Somesh Jha, David Notkin