Sciweavers

1075 search results - page 139 / 215
» Calculating the Number of Tunnels
Sort
View
VRST
2006
ACM
14 years 3 months ago
Limpid desk: see-through access to disorderly desktop in projection-based mixed reality
We propose Limpid Desk which supports document search on a real desktop with virtual transparentizing of the upper layer of a document stack in projection-based mixed reality (MR)...
Daisuke Iwai, Kosuke Sato
ICRA
2005
IEEE
124views Robotics» more  ICRA 2005»
14 years 3 months ago
Pattern Generation of Biped Walking Constrained on Parametric Surface
— This paper describes a generation method for spatially natural biped walking. By limiting the COG (Center of Gravity) motion space to a sculptured surface, the degree of freedo...
Mitsuharu Morisawa, Shuuji Kajita, Kenji Kaneko, K...
ISM
2005
IEEE
109views Multimedia» more  ISM 2005»
14 years 3 months ago
A Trust Model for Ubiquitous Systems based on Vectors of Trust Values
Ubiquitous Computing foresees a massively networked world supporting a population of diverse but cooperating mobile devices where trust relationships between entities are uncertai...
Hassan Jameel, Hung Le Xuan, Umar Kalim, Ali Sajja...
ISQED
2005
IEEE
92views Hardware» more  ISQED 2005»
14 years 3 months ago
An Interconnect Insensitive Linear Time-Varying Driver Model for Static Timing Analysis
This paper presents a two-step, RC-interconnect insensitive linear time-varying (LTV) driver model for gate-level timing calculation. We show how to characterize a driver with the...
Chung-Kuan Tsai, Malgorzata Marek-Sadowska
NCA
2005
IEEE
14 years 3 months ago
An Adaptive Reputation-based Trust Framework for Peer-to-Peer Applications
In distributed P2P environments, peers (i.e., users) often have to request the services from some unfamiliar peers (i.e., resources) that could be altruistic, selfish, or even ma...
William Sears, Zhen Yu, Yong Guan