Sciweavers

1663 search results - page 41 / 333
» Computer Security in the Real World
Sort
View
ROBIO
2006
IEEE
123views Robotics» more  ROBIO 2006»
14 years 1 months ago
Evolutionary Robotics, Anticipation and the Reality Gap
— Evolutionary Robotics provide efficient tools and approach to address automatic design of controllers for automous mobile robots. However, the computational cost of the optimi...
Cédric Hartland, Nicolas Bredeche
ACISICIS
2005
IEEE
14 years 1 months ago
A Comprehensive Middleware Architecture for Context-Aware Ubiquitous Computing Systems
Ubiquitous computing is viewed as a computing paradigm where minimal user intervention is necessitated emphasizing detection of environmental conditions and user behaviors in orde...
Anjum Shehzad, Hung Quoc Ngo, Sungyoung Lee, Young...
3DIM
2003
IEEE
14 years 27 days ago
Stable Real-Time Interaction Between Virtual Humans And Real Scenes
We present an Augmented Reality system that relies on purely passive techniques to solve the real-time registration problem. It can run on a portable PC and does not require engin...
Luca Vacchetti, Vincent Lepetit, George Papagianna...
INTERACT
1997
13 years 9 months ago
BUILD-IT: a computer vision-based interaction technique of a planning tool for construction and design
It is time to go beyond the established approaches in human-computer interaction. With the Augmented Reality (AR) design strategy humans are able to behave as much as possible in a...
Matthias Rauterberg, Martin Bichsel, Ulf Leonhardt...
DEXAW
1995
IEEE
93views Database» more  DEXAW 1995»
13 years 11 months ago
Meta Modeling for End User Computing
Inherent constraints play an important role in the semantic Xplain model. These constraints enable us to represent certain real world knowledge once for subsequent use in several ...
J. H. ter Bekke