Sciweavers

26354 search results - page 5214 / 5271
» How we refactor, and how we know it
Sort
View
WCRE
1999
IEEE
15 years 4 months ago
Chava: Reverse Engineering and Tracking of Java Applets
Java applets have been used increasingly on web sites to perform client-side processing and provide dynamic content. While many web site analysis tools are available, their focus ...
Jeffrey L. Korn, Yih-Farn Chen, Eleftherios Koutso...
ACSAC
1998
IEEE
15 years 4 months ago
The RRA97 Model for Role-Based Administration of Role Hierarchies
Abstract Role-based access control RBAC has recently received a lot of attention due to its exibility, expressive power and simplicity in administration. In RBAC permissions are as...
Ravi S. Sandhu, Qamar Munawer
GW
1999
Springer
157views Biometrics» more  GW 1999»
15 years 4 months ago
The Ecological Approach to Multimodal System Design
Following the ecological approach to visual perception, this paper presents a framework that emphasizes the role of vision on referring actions. In particular, affordances are util...
Antonella De Angeli, Frederic Wolff, Laurent Romar...
HIPS
1998
IEEE
15 years 4 months ago
Constructive and Adaptable Distributed Shared Memory
Distributed shared memory (DSM) is a paradigm for programming distributed systems, which provides an alternative to the message passing model. DSM offers the agents of the system ...
Jordi Bataller, José M. Bernabéu-Aub...
ELPUB
1998
ACM
15 years 4 months ago
Evolving Ecological Niches: Technological Change and the Transformation of the Libraries Role in Publishing
Print has been the most significant scholarly communication technology for the last three hundred years (at least). Kaufer and Carley’s Ecology of Communicative Transactions ana...
Andrew E. Treloar
« Prev « First page 5214 / 5271 Last » Next »