Sciweavers

1472 search results - page 47 / 295
» Access control in virtual environments
Sort
View
VRST
1999
ACM
15 years 8 months ago
The London Travel Demonstrator
Travel can be a stressful experience and it is an activity that is difficult to prepare for in advance. Although maps, routes and landmarks can be memorised, travellers do not get...
Anthony Steed, Emmanuel Frécon, Anneli Avat...
ATC
2007
Springer
15 years 10 months ago
An Approach to a Trustworthy System Architecture Using Virtualization
We present a system architecture for trusted transactions in highly sensitive environments. This architecture takes advantage of techniques provided by the Trusted Computing Group ...
Frederic Stumpf, Michael Benz, Martin Hermanowski,...
COMSIS
2007
166views more  COMSIS 2007»
15 years 4 months ago
Prototype environment for controller programming in the IEC 61131-3 ST language
A prototype compiler of the ST language (Structured Text), its operation and internal structure is presented. The compiler is a principal part of CPDev engineering environment for ...
Dariusz Rzonca, Jan Sadolewski, Bartosz Trybus
VRST
2006
ACM
15 years 10 months ago
Limpid desk: see-through access to disorderly desktop in projection-based mixed reality
We propose Limpid Desk which supports document search on a real desktop with virtual transparentizing of the upper layer of a document stack in projection-based mixed reality (MR)...
Daisuke Iwai, Kosuke Sato
DAGSTUHL
1997
15 years 5 months ago
Constrained Navigation Environments
Finding one’s way through a complex virtual environment is a standard task in 3D graphics and virtual reality applications. Constrained navigation is a method that appropriately...
Andrew J. Hanson, Eric A. Wernert, Stephen B. Hugh...