Sciweavers

1445 search results - page 147 / 289
» Architectures to make Simple Visualisations using Simple Sys...
Sort
View
APGV
2004
ACM
143views Visualization» more  APGV 2004»
14 years 2 months ago
Perceiving translucent materials
Many common materials, including fruit, wax and human skin, are somewhat translucent. What makes an object look translucent or opaque? Here we use a recently developed computer gr...
Roland W. Fleming, Henrik Wann Jensen, Heinrich H....
KES
2004
Springer
14 years 2 months ago
comDesk: A Cooperative Assistance Tool Based on P2P Techniques
We have designed and implemented a desktop sharing system based on P2P (peer-to-peer) techniques, named “comDesk,” which enables users to exchange the desktop images as well as...
Motoki Miura, Buntarou Shizuki, Jiro Tanaka
CORR
2010
Springer
142views Education» more  CORR 2010»
13 years 9 months ago
The Accuracy of Tree-based Counting in Dynamic Networks
Tree-based protocols are ubiquitous in distributed systems. They are flexible, they perform generally well, and, in static conditions, their analysis is mostly simple. Under churn...
Supriya Krishnamurthy, John Ardelius, Erik Aurell,...
IJVR
2007
128views more  IJVR 2007»
13 years 8 months ago
Occlusion Management in Immersive and Desktop 3D Virtual Environments: Theory and Evaluation
—We present an empirical usability experiment studying the relative strengths and weaknesses of three different occlusion management techniques for discovering and accessing obje...
Niklas Elmqvist, Mihail Eduard Tudoreanu
INFOCOM
2010
IEEE
13 years 7 months ago
PhishNet: Predictive Blacklisting to Detect Phishing Attacks
—Phishing has been easy and effective way for trickery and deception on the Internet. While solutions such as URL blacklisting have been effective to some degree, their reliance ...
Pawan Prakash, Manish Kumar, Ramana Rao Kompella, ...