Sciweavers

1663 search results - page 138 / 333
» Computer Security in the Real World
Sort
View
131
Voted
CW
2008
IEEE
15 years 10 months ago
Taxonomy and Implementation of Redirection Techniques for Ubiquitous Passive Haptic Feedback
Traveling through immersive virtual environments (IVEs) by means of real walking is an important activity to increase naturalness of VR-based interaction. However, the size of the...
Frank Steinicke, Gerd Bruder, Luv Kohli, Jason Jer...
168
Voted
AROBOTS
2007
159views more  AROBOTS 2007»
15 years 3 months ago
Structure-based color learning on a mobile robot under changing illumination
— A central goal of robotics and AI is to be able to deploy an agent to act autonomously in the real world over an extended period of time. To operate in the real world, autonomo...
Mohan Sridharan, Peter Stone
129
Voted
MOBISYS
2007
ACM
16 years 3 months ago
Rendezvous-based access control for medical records in the pre-hospital environment
We present rendezvous-based access control for access control in the pre-hospital environment. Rendezvous-based access control is a simple cryptographic access control method that...
Feike W. Dillema, Simone Lupetti
ACMACE
2005
ACM
15 years 9 months ago
Possession techniques for interaction in real-time strategy augmented reality games
There have been a number of interactive games created for Augmented Reality (AR) environments. In this paper, interaction techniques to support Real-Time Strategy (RTS) games in A...
Keith Phillips, Wayne Piekarski
118
Voted
JUCS
2008
113views more  JUCS 2008»
15 years 3 months ago
Enhancing ZRTP by using Computational Puzzles
Abstract: In this paper we present and discuss a new approach for securing multimedia communication, which is based on three innovations. The first innovation is the integration of...
Helmut Hlavacs, Wilfried N. Gansterer, Hannes Scha...