• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 211,844
Next 10 →

Agile Application-Aware Adaptation for Mobility

by Brian D. Noble, M. Satyanarayanan, Dushyanth Narayanan, James Eric Tilton, Jason Flinn, Kevin R. Walker - SOSP-16 , 1997
"... In this paper we show that application-aware adaptation, a collaborative partnership between the operating system and applications, offers the most general and effective approach to mobile information access. We describe the design of Odyssey, a prototype implementing this approach, and show how it ..."
Abstract - Cited by 503 (31 self) - Add to MetaCart
In this paper we show that application-aware adaptation, a collaborative partnership between the operating system and applications, offers the most general and effective approach to mobile information access. We describe the design of Odyssey, a prototype implementing this approach, and show how

Usability Analysis of Visual Programming Environments: a `cognitive dimensions' framework

by T. R. G. Green, M. Petre - JOURNAL OF VISUAL LANGUAGES AND COMPUTING , 1996
"... The cognitive dimensions framework is a broad-brush evaluation technique for interactive devices and for non-interactive notations. It sets out a small vocabulary of terms designed to capture the cognitively-relevant aspects of structure, and shows how they can be traded off against each other. T ..."
Abstract - Cited by 510 (13 self) - Add to MetaCart
The cognitive dimensions framework is a broad-brush evaluation technique for interactive devices and for non-interactive notations. It sets out a small vocabulary of terms designed to capture the cognitively-relevant aspects of structure, and shows how they can be traded off against each other

Principled design of the modern web architecture

by Roy T. Fielding, Richard N. Taylor - ACM Trans. Internet Techn
"... The World Wide Web has succeeded in large part because its software architecture has been designed to meet the needs of an Internet-scale distributed hypermedia system. The modern Web architecture emphasizes scalability of component interactions, generality of interfaces, independent deployment of c ..."
Abstract - Cited by 507 (14 self) - Add to MetaCart
The World Wide Web has succeeded in large part because its software architecture has been designed to meet the needs of an Internet-scale distributed hypermedia system. The modern Web architecture emphasizes scalability of component interactions, generality of interfaces, independent deployment

A Metrics Suite for Object Oriented Design

by Shyam R. Chidamber, Chris F. Kemerer, Sloan Wp No, Shyam R. Chidamber, Chris F. Kemerer, S. R. Chidamber, C. F. Kemerer, Shyam R. Chidamber, Chris F. Kemerer - IEEE Trans. Softw. Eng , 1994
"... Given the central role that software development plays in the delivery and application of information technology, managers are increasingly focusing on process improvement in the software development area. This demand has spurred the provision of a number of new and/or improved approaches to softwar ..."
Abstract - Cited by 1079 (3 self) - Add to MetaCart
new technology for which established practices have yet to be developed. This research addresses these needs through the development and implementation of a new suite of metrics for 00 design. Metrics developed in previous research, while contributing to the field's understanding of software dev

Why Johnny can’t encrypt: A usability evaluation of PGP 5.0

by Alma Whitten, J. D. Tygar , 1999
"... User errors cause or contribute to most computer security failures, yet user interfaces for security still tend to be clumsy, confusing, or near-nonexistent. Is this simply due to a failure to apply standard user interface design techniques to security? We argue that, on the contrary, effective secu ..."
Abstract - Cited by 472 (4 self) - Add to MetaCart
security requires a different usability standard, and that it will not be achieved through the user interface design techniques appropriate to other types of consumer software. To test this hypothesis, we performed a case study of a security program which does have a good user interface by general

Cyberguide: A Mobile Context-Aware Tour Guide

by Gregory D. Abowd, Christopher G. Atkeson, Jason Hong, Sue Long, Rob Kooper, Mike Pinkerton , 1996
"... Future computing environments will free the user from the constraints of the desktop. Applications for a mobile environment should take advantage of contextual information, suach as position, to offer greater services to the user. In his paper, we present the Cyberguide project, in which we are buil ..."
Abstract - Cited by 642 (24 self) - Add to MetaCart
Future computing environments will free the user from the constraints of the desktop. Applications for a mobile environment should take advantage of contextual information, suach as position, to offer greater services to the user. In his paper, we present the Cyberguide project, in which we

The Ontolingua Server: a Tool for Collaborative Ontology Construction

by Adam Farquhar, Richard Fikes, James Rice - International Journal of Human-Computer Studies , 1996
"... Reusable ontologies are becoming increasingly important for tasks such as information integration, knowledge-level interoperation, and knowledgebase development. We have developed a set of tools and services to support the process of achieving consensus on common shared ontologies by geographically ..."
Abstract - Cited by 473 (6 self) - Add to MetaCart
distributed groups. These tools make use of the worldwide web to enable wide access and provide users with the ability to publish, browse, create, and edit ontologies stored on an ontology server. Users can quickly assemble a new ontology from a library of modules. We discuss how our system was constructed

A message ferrying approach for data delivery in sparse mobile ad hoc networks

by Wenrui Zhao, Mostafa Ammar, Ellen Zegura - In Proc. of ACM Mobihoc , 2004
"... Mobile Ad Hoc Networks (MANETs) provide rapidly deployable and self-configuring network capacity required in many critical applications, e.g., battlefields, disaster relief and wide area sensing. In this paper we study the problem of efficient data delivery in sparse MANETs where network partitions ..."
Abstract - Cited by 496 (14 self) - Add to MetaCart
) approach to address the problem. MF is a mobility-assisted approach which utilizes a set of special mobile nodes called message ferries (or ferries for short) to provide communication service for nodes in the deployment area. The main idea behind the MF approach is to introduce non

New Directions in Cryptography

by Whitfield Diffie, Martin E. Hellman , 1976
"... Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to a need for new types of cryptographic systems, which minimize the need for secure key distribution channels and supply the equivalent of a written signature. This paper sug ..."
Abstract - Cited by 3499 (7 self) - Add to MetaCart
Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to a need for new types of cryptographic systems, which minimize the need for secure key distribution channels and supply the equivalent of a written signature. This paper

Disconnected Operation in the Coda File System

by James J. Kistler, M. Satyanarayanan - ACM Transactions on Computer Systems , 1992
"... Disconnected operation is a mode of operation that enables a client to continue accessing critical data during temporary failures of a shared data repository. An important, though not exclusive, application of disconnected operation is in supporting portable computers. In this paper, we show that di ..."
Abstract - Cited by 1014 (36 self) - Add to MetaCart
Disconnected operation is a mode of operation that enables a client to continue accessing critical data during temporary failures of a shared data repository. An important, though not exclusive, application of disconnected operation is in supporting portable computers. In this paper, we show
Next 10 →
Results 1 - 10 of 211,844
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University