Sciweavers

1130 search results - page 166 / 226
» Developing Trust In Virtual Software Development Teams
Sort
View
133
Voted
USENIX
2008
15 years 5 months ago
LeakSurvivor: Towards Safely Tolerating Memory Leaks for Garbage-Collected Languages
Continuous memory leaks severely hurt program performance and software availability for garbage-collected programs. This paper presents a safe method, called LeakSurvivor, to tole...
Yan Tang, Qi Gao, Feng Qin
124
Voted
IDT
2007
83views more  IDT 2007»
15 years 3 months ago
Negotiating flexible agreements by combining distributive and integrative negotiation
This paper presents an approach to automated negotiation between agents which attempts to combine the advantages of a co-operative value adding approach, with the reality that neg...
Quoc Bao Vo, Lin Padgham, Lawrence Cavedon
166
Voted
EUROSYS
2008
ACM
16 years 19 days ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler
124
Voted
UIST
2006
ACM
15 years 9 months ago
Interacting with dynamically defined information spaces using a handheld projector and a pen
The recent trend towards miniaturization of projection technology indicates that handheld devices will soon have the ability to project information onto any surface, thus enabling...
Xiang Cao, Ravin Balakrishnan
133
Voted
CW
2004
IEEE
15 years 7 months ago
Interactive Function-Based Shape Modeling for Cyberworlds
Shared virtual worlds require exchanging shape models over the Internet. Since complex shapes such as VRML objects are often defined with polygonal meshes, the size of models may ...
Konstantin Levinski, Alexei Sourin