Sciweavers

2261 search results - page 369 / 453
» Dynamic types for authentication
Sort
View
USENIX
1996
13 years 10 months ago
A Comparison of OS Extension Technologies
The current trend in operating systems research is to allow applications to dynamically extend the kernel to improve application performance or extend functionality, but the most ...
Christopher Small, Margo I. Seltzer
IJCAI
1989
13 years 10 months ago
Perturbation Analysis with Qualitative Models
Perturbation analysis deals with the relation­ ships between small changes in a system's inputs or model and changes in its outputs. Reverse simulation is of particular inte...
Renato de Mori, Robert Prager
CVPR
2010
IEEE
13 years 10 months ago
Player Localization Using Multiple Static Cameras for Sports Visualization
We present a novel approach for robust localization of multiple people observed using multiple cameras. We use this location information to generate sports visualizations, which i...
Raffay Hamid, Ramkrishan Kumar, Matthias Grundmann...
HAPTICS
2008
IEEE
13 years 10 months ago
A Study on the Role of Force Feedback for Teleoperation of Industrial Overhead Crane
Abstract. In this paper, a study on the role of force feedback for teleoperation of industrial overhead crane is presented. Teleoperation of industrial crane was described and anal...
Ildar Farkhatdinov, Jee-Hwan Ryu
LDTA
2010
13 years 9 months ago
Embedding a web-based workflow management system in a functional language
Workflow management systems guide and monitor tasks performed by humans and computers. The workflow specifications are usually expressed in special purpose (graphical) formalisms....
Jan Martin Jansen, Rinus Plasmeijer, Pieter W. M. ...