Sciweavers

140
Voted
ICISS
2009
Springer
15 years 15 days ago
Method-Specific Java Access Control via RMI Proxy Objects Using Annotations
We propose a novel approach for granting partial access on arbitrary objects at the granularity of methods to remote clients. The applications that we target use Remote Method Invo...
Jeff Zarnett, Patrick Lam, Mahesh V. Tripunitara
126
Voted
OOPSLA
2004
Springer
15 years 8 months ago
Transparent proxies for java futures
A proxy object is a surrogate or placeholder that controls access to another target object. Proxies can be used to support distributed programming, lazy or parallel evaluation, ac...
Polyvios Pratikakis, Jaime Spacco, Michael W. Hick...
123
Voted
CW
2008
IEEE
15 years 9 months ago
Taxonomy and Implementation of Redirection Techniques for Ubiquitous Passive Haptic Feedback
Traveling through immersive virtual environments (IVEs) by means of real walking is an important activity to increase naturalness of VR-based interaction. However, the size of the...
Frank Steinicke, Gerd Bruder, Luv Kohli, Jason Jer...