Sciweavers

8030 search results - page 1361 / 1606
» User Interface
Sort
View
CCS
2008
ACM
15 years 6 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
ASSETS
2005
ACM
15 years 6 months ago
Visualizing non-speech sounds for the deaf
Sounds constantly occur around us, keeping us aware of our surroundings. People who are deaf have difficulty maintaining an awareness of these ambient sounds. We present an invest...
Tara Matthews, Janette Fong, Jennifer Mankoff
CRITICAL
2005
15 years 6 months ago
Comparing two approaches to context: realism and constructivism
During the last few years, there have been debates over what is context and how computers should act upon it. Two disparate camps of thought can be recognized. First, Realism, hav...
Antti Oulasvirta, Sakari Tamminen, Kristina Hö...
ECLIPSE
2005
ACM
15 years 6 months ago
ConcernMapper: simple view-based separation of scattered concerns
We introduce ConcernMapper, an Eclipse plug-in for experimenting with techniques for advanced separation of concerns. ConcernMapper supports development and maintenance tasks invo...
Martin P. Robillard, Frédéric Weigan...
CSCW
2008
ACM
15 years 6 months ago
Collaboration and interference: awareness with mice or touch input
Multi-touch surfaces are becoming increasingly popular. An assumed benefit is that they can facilitate collaborative interactions in co-located groups. In particular, being able t...
Eva Hornecker, Paul Marshall, Nick Sheep Dalton, Y...
« Prev « First page 1361 / 1606 Last » Next »