Sciweavers

1663 search results - page 60 / 333
» Computer Security in the Real World
Sort
View
VR
2002
IEEE
161views Virtual Reality» more  VR 2002»
14 years 1 months ago
Perceived Egocentric Distances in Real, Image-Based, and Traditional Virtual Environments
In virtual environments, perceived egocentric distances are consistently underestimated when compared to the same distance judgments in the real world. The research presented in t...
Peter Willemsen, Amy Gooch
TOG
2008
128views more  TOG 2008»
13 years 8 months ago
VirtualStudio2Go: digital video composition for real environments
We synchronize film cameras and LED lighting with off-the-shelf video projectors. Radiometric compensation allows displaying keying patterns and other spatial codes on arbitrary r...
Anselm Grundhöfer, Oliver Bimber
SC
2005
ACM
14 years 2 months ago
An Adaptive Visual Analytics Platform for Mobile Devices
We present the design and implementation of InfoStar, an adaptive visual analytics platform for mobile devices such as PDAs, laptops, Tablet PCs and mobile phones. InfoStar extends...
Antonio Sanfilippo, Richard May, Gary Danielson, B...
HICSS
2002
IEEE
130views Biometrics» more  HICSS 2002»
14 years 1 months ago
Experiences of Using a Public Key Infrastructure to Access Patient Confidential Data over the Internet
A project to enable health care professionals (GPs, practice nurses and diabetes nurse specialists) to access, via the Internet, confidential patient data held on a secondary care...
David W. Chadwick, Carmen Carroll, S. Harvey, John...
ISORC
2008
IEEE
14 years 3 months ago
Compositional Feasibility Analysis of Conditional Real-Time Task Models
Conditional real-time task models, which are generalizations of periodic, sporadic, and multi-frame tasks, represent real world applications more accurately. These models can be c...
Madhukar Anand, Arvind Easwaran, Sebastian Fischme...