Sciweavers

1949 search results - page 245 / 390
» Protective Interface Specifications
Sort
View
CSCW
1998
ACM
15 years 7 months ago
Tailorable Domain Objects as Meeting Tools for an Electronic Whiteboard
Our goal is to provide tools to support working meetings on an electronic whiteboard, called Tivoli. This paper describes how we have integrated structured “domain objects” in...
Thomas P. Moran, William van Melle, Patrick Chiu
114
Voted
TOOLS
1997
IEEE
15 years 7 months ago
JBCDL: An Object-Oriented Component Description Language
This paper introduces Jade Bird Component Description Language (JBCDL) which is a part of Jade Bird Component Library (JBCL). JBCDL is based on Jade Bird Component Model (JBCOM). ...
Qiong Wu, Jichuan Chang, Hong Mei, Fuqing Yang
109
Voted
GESELLSCHAFT
1993
15 years 7 months ago
Phasenmodell ist OUT - Benutzerbeteiligung jetzt auch bei Standardsoftware-Entwicklung
The current state of traditional software development is surveyed and essential problems are investigated on the basis of system theoretical considerations. The concept of user pa...
Matthias Rauterberg, Raimund Mollenhauer, Philipp ...
126
Voted
DPPI
2007
ACM
15 years 7 months ago
Shared moments: opportunities for mobile phones in religious participation
The near ubiquity of mobile phones in the world and in people's lives, have created new opportunities for reinterpretation of what these devices are and what they do. One area...
Rhiannon Sterling, John Zimmerman
113
Voted
COMPSAC
2009
IEEE
15 years 7 months ago
GUI-Based Testing of Boundary Overflow Vulnerability
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or acce...
Tugkan Tuglular, Can A. Muftuoglu, Özgür...