Sciweavers

3155 search results - page 193 / 631
» How Are You Doing
Sort
View
UTP
2010
13 years 7 months ago
Unifying Theories of Confidentiality
Abstract. This paper presents a framework for reasoning about the security of confidential data within software systems. A novelty is that we use Hoare and He's Unifying Theor...
Michael J. Banks, Jeremy L. Jacob
GRAPHICSINTERFACE
2009
13 years 7 months ago
Haptic conviction widgets
We introduce a haptic mousewheel as a platform for design exploration of haptic conviction widgets. Conviction is how strongly one wants to do something, or how strongly one desir...
Gerry Chu, Tomer Moscovich, Ravin Balakrishnan
CORR
2011
Springer
140views Education» more  CORR 2011»
13 years 4 months ago
Sampling-rate-aware noise generation
In this paper we consider the generation of discrete white noise. Despite this seems to be a simple problem, common noise generator implementations do not deliver comparable resul...
Henning Thielemann
INTENV
2010
13 years 4 months ago
Tales From a Pod
In this Science-Fiction Prototyping article, I present an imaginative forward look at how artificial intelligence and virtual environments might change the nature of future educati...
Vic Callaghan
MAGS
2010
92views more  MAGS 2010»
13 years 4 months ago
Sequential auctions for common value objects with budget constrained bidders
This paper analyzes sequential auctions for budget constrained bidders, for multiple heterogeneous common value objects. In most auctions, bidders not only have valuations for obj...
S. Shaheen Fatima, Michael Wooldridge, Nicholas R....