Sciweavers

851 search results - page 146 / 171
» Controlling a camera in a virtual environment
Sort
View
ESORICS
2003
Springer
14 years 27 days ago
Hardware Encapsulation of Security Services
Hardware security modules can be used to encapsulate simple security services that bind security functions such as decryption with authorisation and authentication. Such hardware ...
Adrian Baldwin, Simon Shiu
ICRA
2002
IEEE
98views Robotics» more  ICRA 2002»
14 years 18 days ago
An Efficient Coordination Architecture for Autonomous Robot Teams
Most physically implemented multi-robot controllers are based on extensions of behavior-based systems. While efficient, such techniques suffer from weak representational power. Sy...
Aaron Khoo, Ian Douglas Horswill
3DIM
1999
IEEE
14 years 3 hour ago
An Automation System for Industrial 3-D Laser Digitizing
An architecture and prototype implementation of an automation system for industrial 3-D digitization is described. Facilities for automated view planning, collision avoidance and ...
D. G. Lamb, D. L. Baird, Michael A. Greenspan
IFIP
1998
Springer
13 years 12 months ago
Migrating Objects in Electronic Commerce Applications
Electronic Commerce is a field of application that is distributed by nature where different parties share information and work concurrently and cooperatively on objects, potential...
Marko Boger
DAGSTUHL
2001
13 years 9 months ago
Programmable Networks
In this paper we present a programmable networking model that provides a common framework for understanding the state-of-the-art in programmable networks. A number of projects are...
Andrew T. Campbell, Michael E. Kounavis, John B. V...