Sciweavers

1663 search results - page 54 / 333
» Computer Security in the Real World
Sort
View
BCSHCI
1997
13 years 10 months ago
BUILD-IT: A Computer Vision-based Interaction Technique for a Planning Tool
In this article we wish to show a method to go beyond the established approaches of human-computer interaction. We first bring a serious critique of traditional interface types, sh...
Matthias Rauterberg, Morten Fjeld, Helmut Krueger,...
RT
2001
Springer
14 years 1 months ago
Shader Lamps: Animating Real Objects With Image-Based Illumination
We describe a new paradigm for three-dimensional computer graphics, using projectors to graphically animate physical objects in the real world. The idea is to replace a physical o...
Ramesh Raskar, Greg Welch, Kok-Lim Low, Deepak Ban...
ICRA
2005
IEEE
143views Robotics» more  ICRA 2005»
14 years 2 months ago
Locomoting with Less Computation but More Morphology
– Biped walking is one of the most graceful movements observed in humans. Today’s humanoid robots, despite their undeniably impressive performance, are still a long way from th...
Kojiro Matsushita, Max Lungarella, Chandana Paul, ...
GRC
2007
IEEE
14 years 3 months ago
Structured Writing with Granular Computing Strategies
— Granular computing unifies structured thinking, structured problem solving and structured information processing. In order to see the flexibility and universal applicability ...
Yiyu Yao
GCC
2003
Springer
14 years 2 months ago
On the Malicious Participants Problem in Computational Grid
Abstract. Computational Grid allows customers to submit tasks to service providers. To maintain the availability, fairness and performance, it is critical to protect Computational ...
Wenguang Chen, Weimin Zheng, Guangwen Yang