Sciweavers

4455 search results - page 32 / 891
» The family and communication technologies
Sort
View
IMC
2006
ACM
15 years 5 months ago
Finding diversity in remote code injection exploits
Remote code injection exploits inflict a significant societal cost, and an active underground economy has grown up around these continually evolving attacks. We present a method...
Justin Ma, John Dunagan, Helen J. Wang, Stefan Sav...
COOPIS
1996
IEEE
15 years 4 months ago
Integrity Constraint Checking in Federated Databases
A federated database is comprised of multiple interconnected database systems that primarily operate independently but cooperate to a certain extent. Global integrity constraints c...
Paul W. P. J. Grefen, Jennifer Widom
CERA
2002
134views more  CERA 2002»
14 years 11 months ago
Graph Grammar Based Product Family Modeling
: Many industries are shifting from mass production to mass customization, which demands quick response to the needs of individual customers with high quality and low costs. The de...
Xuehong Du, Jianxin Jiao, Mitchell M. Tseng
CSCW
2006
ACM
15 years 5 months ago
HomeNote: supporting situated messaging in the home
In this paper we describe a field trial designed to investigate the potential of remote, situated messaging within the home. Five households used our “HomeNote” device for app...
Abigail Sellen, Richard H. R. Harper, Rachel Eardl...
CHI
2004
ACM
16 years 5 days ago
Technology: a means for enhancing the independence and connectivity of older people
The focus of this panel will be on aging and technology. The intent is to demonstrate how technology can be used to help older adults remain independent, productive and connected ...
Herman Bouma, Sara J. Czaja, Hiroyuki Umemuro, Wen...