Sciweavers

1298 search results - page 259 / 260
» Exploring second life
Sort
View
INFOCOM
2011
IEEE
12 years 11 months ago
A cross-domain privacy-preserving protocol for cooperative firewall optimization
—Firewalls have been widely deployed on the Internet for securing private networks. A firewall checks each incoming or outgoing packet to decide whether to accept or discard the...
Fei Chen, Bezawada Bruhadeshwar, Alex X. Liu
HUC
2011
Springer
12 years 7 months ago
How smart is your smartcard?: measuring travel behaviours, perceptions, and incentives
The widespread adoption of automated fare collection (AFC) systems by public transport authorities around the world means that, increasingly, people carry and use passive sensors ...
Neal Lathia, Licia Capra
IUI
2012
ACM
12 years 3 months ago
Effective browsing and serendipitous discovery with an experience-infused browser
In the digital age, users can have perfect recall of their digital experiences. In this paper, we explore how this recall can be leveraged during web browsing. We have built a sys...
Sudheendra Hangal, Abhinay Nagpal, Monica S. Lam
TEI
2012
ACM
285views Hardware» more  TEI 2012»
12 years 3 months ago
Sketch-a-TUI: low cost prototyping of tangible interactions using cardboard and conductive ink
Graspable tangibles are now being explored on the current generation of capacitive touch surfaces, such as the iPad and the Android tablet. Because the size and form factor is rel...
Alexander Wiethoff, Hanna Schneider, Michael Rohs,...
CVPR
2012
IEEE
11 years 10 months ago
Center-Shift: An approach towards automatic robust mesh segmentation (ARMS)
In the area of 3D shape analysis, research in mesh segmentation has always been an important topic, as it is a fundamental low-level task which can be utilized in many application...
Mengtian Sun, Yi Fang, Karthik Ramani