Sciweavers

503 search results - page 46 / 101
» Authenticity by tagging and typing
Sort
View
PERCOM
2006
ACM
14 years 8 months ago
Cantag: an open source software toolkit for designing and deploying marker-based vision systems
This paper presents Cantag, an open source software toolkit for building Marker-based Vision (MBV) systems that can identify and accurately locate printed markers in three dimensi...
Andrew C. Rice, Alastair R. Beresford, Robert K. H...
ECSCW
2007
13 years 10 months ago
Social bookmarking and exploratory search
In this paper, we explore various search tasks that are supported by a social bookmarking service. These bookmarking services hold great potential to powerfully combine personal ta...
David R. Millen, Meng Yang, Steven Whittaker, Jona...
JOOP
1998
105views more  JOOP 1998»
13 years 8 months ago
Implementing Constructor Calls with Parameters in Ada 95
Ada ‘95 does not provide for a constructor mechanism with parameters for initializing newly created objects. The package Ada.Finalization provides an initialize procedure which ...
Zeki O. Bayram
APLAS
2007
ACM
14 years 26 days ago
Finally Tagless, Partially Evaluated
We have built the first family of tagless interpretations for a higher-order typed object language in a typed metalanguage (Haskell or ML) that require no dependent types, general...
Jacques Carette, Oleg Kiselyov, Chung-chieh Shan
FPLAY
2008
13 years 10 months ago
Lessons from Brain Age on password memorability
User authentication involves establishing a user's right to access a system. Most user authentication is done with text passwords, which have advantages over other approaches...
Alain Forget, Sonia Chiasson, Robert Biddle