Sciweavers

2537 search results - page 183 / 508
» How to draw a group
Sort
View
VRML
1999
ACM
14 years 1 months ago
Avatars in LivingSpace
We describe how we implemented the avatars we use to represent users in LivingSpace, our implementation of the Living Worlds standard for multi-user distributed VRML worlds. Livin...
Mike Wray, Vincent Belrose
LICS
1999
IEEE
14 years 1 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
SIGGRAPH
1994
ACM
14 years 1 months ago
Computer-generated pen-and-ink illustration
This paper describes the principles of traditional pen-and-ink illustration, and shows how a great number of them can be implemented as part of an automated rendering system. It i...
Georges Winkenbach, David Salesin
ACMACE
2007
ACM
14 years 1 months ago
Augmenting amusement rides with telemetry
We present a system that uses wireless telemetry to enhance the experience of fairground and theme park amusement rides. Our system employs wearable technologies to capture video,...
Brendan Walker, Holger Schnädelbach, Stefan R...
AOSD
2007
ACM
14 years 1 months ago
Efficiently mining crosscutting concerns through random walks
Inspired by our past manual aspect mining experiences, this paper describes a random walk model to approximate how crosscutting concerns can be discovered in the absence of domain...
Charles Zhang, Hans-Arno Jacobsen