Sciweavers

564 search results - page 59 / 113
» Corner cutting systems
Sort
View
CCS
2008
ACM
13 years 11 months ago
Reconsidering physical key secrecy: teleduplication via optical decoding
The access control provided by a physical lock is based on the assumption that the information content of the corresponding key is private -- that duplication should require eithe...
Benjamin Laxton, Kai Wang, Stefan Savage
JGAA
2007
124views more  JGAA 2007»
13 years 9 months ago
Energy Models for Graph Clustering
The cluster structure of many real-world graphs is of great interest, as the clusters may correspond e.g. to communities in social networks or to cohesive modules in software syst...
Andreas Noack
VR
2008
IEEE
174views Virtual Reality» more  VR 2008»
13 years 7 months ago
Stable haptic interaction using a damping model to implement a realistic tooth-cutting simulation for dental training
It is difficult to implement a stable and realistic haptic simulation for cutting rigid objects that is based on a damping model because of an inevitable conflict between stability...
Guanyang Liu, Yuru Zhang, Dangxiao Wang, William T...
ICMCS
1999
IEEE
90views Multimedia» more  ICMCS 1999»
14 years 1 months ago
SpaceTag: An Overlaid Virtual System and Its Applications
SpaceTag is an object system on which each object called SpaceTag can be accessed only from limited locations and limited time period. Its applications include entertainment syste...
Hiroyuki Tarumi, Ken Morishita, Megumi Nakao, Yahi...
JAR
2010
123views more  JAR 2010»
13 years 7 months ago
A Framework for Proof Systems
Meta-logics and type systems based on intuitionistic logic are commonly used for specifying natural deduction proof systems. We shall show here that linear logic can be used as a m...
Vivek Nigam, Dale Miller