Sciweavers

32028 search results - page 6290 / 6406
» Experimenting a
Sort
View
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
15 years 2 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
USS
2010
15 years 2 months ago
Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy
On November 3, 2009, voters in Takoma Park, Maryland, cast ballots for mayor and city council members using the ScantegrityII voting system--the first time any end-to-end (e2e) vo...
Richard Carback, David Chaum, Jeremy Clark, John C...
VRST
2010
ACM
15 years 2 months ago
Shake-your-head: revisiting walking-in-place for desktop virtual reality
The Walking-In-Place interaction technique was introduced to navigate infinitely in 3D virtual worlds by walking in place in the real world. The technique has been initially devel...
Léo Terziman, Maud Marchal, Mathieu Emily, ...
VRST
2010
ACM
15 years 2 months ago
Augmentation techniques for efficient exploration in head-mounted display environments
Physical characteristics and constraints of today's head-mounted displays (HMDs) often impair interaction in immersive virtual environments (VEs). For instance, due to the li...
Benjamin Bolte, Gerd Bruder, Frank Steinicke, Klau...
VTC
2010
IEEE
195views Communications» more  VTC 2010»
15 years 2 months ago
Efficiency of Distributed Compression and Its Dependence on Sensor Node Deployments
Abstract--In this paper we analyze the energy-efficiency of distributed compression and its dependence on the node deployment strategies for Wireless Sensor Networks (WSNs). Reduce...
Frank Oldewurtel, Janne Riihijärvi, Petri M&a...
« Prev « First page 6290 / 6406 Last » Next »