Sciweavers

504 search results - page 50 / 101
» Lessons Learned from Real DSL Experiments
Sort
View
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
15 years 2 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
CODES
1998
IEEE
15 years 2 months ago
Hardware/software co-design of an ATM network interface card: a case study
This paper discusses a case study, the co-design of an ATM Network Interface Card (NIC). The NIC is aimed to interface applications with the physical network line. It is composed ...
Jean-Marc Daveau, Gilberto Fernandes Marchioro, Ah...
CHI
1997
ACM
15 years 2 months ago
The Design of a GUI Paradigm based on Tablets, Two-hands, and Transparency
An experimental GUI paradigm is presented which is based on the design goals of maximizing the amount of screen used for application data, reducing the amount that the UI diverts ...
Gordon Kurtenbach, George W. Fitzmaurice, Thomas B...
PAKM
2004
14 years 11 months ago
Integrating Knowledge Management and Groupware in a Software Development Environment
Knowledge is one of the organization's most valuable assets. In the context of software development, knowledge management can be used to capture knowledge and experience gener...
Ricardo de Almeida Falbo, Daniel O. Arantes, Ana C...
WIKIS
2010
ACM
14 years 10 months ago
ThinkFree: using a visual Wiki for IT knowledge management in a tertiary institution
We describe ThinkFree, an industrial Visual Wiki application which provides a way for end users to better explore knowledge of IT Enterprise Architecture assets that is held withi...
Christian Hirsch, John G. Hosking, John C. Grundy,...