Sciweavers

335 search results - page 37 / 67
» Dependable Computing in Virtual Laboratories
Sort
View
CHI
2010
ACM
14 years 21 days ago
Steadied-bubbles: combining techniques to address pen-based pointing errors for younger and older adults
Tablet PCs are gaining popularity but many older adults still struggle with pointing, particularly with two error types: missing, landing and lifting outside the target bounds; an...
Karyn Moffatt, Joanna McGrenere
ECOOPW
1994
Springer
13 years 11 months ago
Abstracting Interactions Based on Message Sets
ing Interactions Based on Message Sets Svend Frr 1 and Gul Agha2. 1 Hewlett-Packard Laboratories, 1501 Page Mill Road, Palo Alto, CA 94303 2 University of Illinois, 1304 W. Springf...
Svend Frølund, Gul Agha
ACMSE
2005
ACM
13 years 9 months ago
Simulating application level self-similar network traffic using hybrid heavy-tailed distributions
Many networking researches depend on an accurate simulation of network traffic. For example, Intrusion Detection Systems generally require tuning to be effective in each new envir...
Song Luo, Gerald A. Marin
CVPR
2010
IEEE
13 years 5 months ago
Axial light field for curved mirrors: Reflect your perspective, widen your view
Mirrors have been used to enable wide field-of-view (FOV) catadioptric imaging. The mapping between the incoming and reflected light rays depends non-linearly on the mirror shape ...
Yuichi Taguchi, Amit K. Agrawal, Srikumar Ramaling...
OZCHI
2006
ACM
14 years 1 months ago
Spatial sound localization in an augmented reality environment
Augmented Reality (AR), the overlay of virtual images onto the real world, is an increasingly popular technique for developing new human-computer interfaces. As human navigation a...
Jaka Sodnik, Saso Tomazic, Raphael Grasset, Andrea...