Sciweavers

390 search results - page 66 / 78
» Case Study: Interactive Visualization for Internet Security
Sort
View
SI3D
2003
ACM
14 years 26 days ago
Incorporating dynamic real objects into immersive virtual environments
We present algorithms that enable virtual objects to interact with and respond to virtual representations, avatars, of real objects. These techniques allow dynamic real objects, s...
Benjamin Lok, Samir Naik, Mary C. Whitton, Frederi...
AVI
2008
13 years 10 months ago
A mixed-fidelity prototyping tool for mobile devices
In this paper we present a software framework which supports the construction of mixed-fidelity (from sketch-based to software) prototypes for mobile devices. The framework is ava...
Marco de Sá, Luís Carriço, Lu...
ICSE
1999
IEEE-ACM
13 years 12 months ago
A Practical Method for Verifying Event-Driven Software
Formal verification methods are used only sparingly in software development. The most successful methods to date are based on the use of model checking tools. To use such he user ...
Gerard J. Holzmann, Margaret H. Smith
IJET
2007
148views more  IJET 2007»
13 years 7 months ago
ENGLISH LANGUAGE TEACHING WITH AN ELECTRONIC CONCEPT MAPPING
—Educational technologies have contributed greatly to the improvement of the process of education. Besides contributing to education directly, the development in new technologies...
Erdogan Tezci, Cihad Demirli, Vahit Sapar
RAID
2007
Springer
14 years 1 months ago
SpyShield: Preserving Privacy from Spy Add-Ons
Spyware infections are becoming extremely pervasive, posing a grave threat to Internet users’ privacy. Control of such an epidemic is increasingly difficult for the existing def...
Zhuowei Li, XiaoFeng Wang, Jong Youl Choi