Sciweavers

1663 search results - page 37 / 333
» Computer Security in the Real World
Sort
View
ICPR
2008
IEEE
14 years 8 months ago
Making real games virtual: Tracking board game pieces
The same game is often played in real and virtual worlds. We integrate in-person and on-line playing of board games such as Go, bringing the real world into the virtual world. A p...
Steven Scher, Ryan Crabb, James Davis
EUROCAST
2005
Springer
182views Hardware» more  EUROCAST 2005»
14 years 1 months ago
Computer Vision Application: Real Time Smart Traffic Light
Abstract. The design, development, construction and testing of an ArtificialVision controlled Traffic-Light prototype has been carried out to rule and regulate intersections. Metho...
Ángel Serrano, Cristina Conde, Licesio J. R...
IJCAI
1997
13 years 9 months ago
Remote-Brained Robots
We introduce our research approach to investigating real world intelligence by building 'Remote-Brained Robots'. The key idea is that of interfacing AI systems with real...
Masayuki Inaba
CCS
2006
ACM
13 years 11 months ago
Modelling the relative strength of security protocols
In this paper, we present a way to think about the relative strength of security protocols using SoS, a lattice-theoretic representation of security strength. In particular, we di...
Ho Chung, Clifford Neuman
CHI
2008
ACM
14 years 8 months ago
The disappearing desktop: pim 2008
In an ideal world, we would always have the right information, in the right form, with the right context, right when we needed it. Unfortunately, we do not live in an ideal world....
Jaime Teevan, William Jones