Sciweavers

1818 search results - page 353 / 364
» How users use access control
Sort
View
VIS
2004
IEEE
156views Visualization» more  VIS 2004»
14 years 9 months ago
Force-Feedback-Enhanced Navigation for Interactive Visualization of Coronary Vessels
Coronary heart disease (CHD) is the number one killer in the United States. Although it is well known that CHD mainly occurs due to blocked arteries, there are contradictory resul...
Thomas Wischgoll, Elke Moritz, Jörg Meyer
PRESENCE
2002
185views more  PRESENCE 2002»
13 years 7 months ago
EyeTap Devices for Augmented, Deliberately Diminished, or Otherwise Altered Visual Perception of Rigid Planar Patches of Real-Wo
Diminished reality is as important as augmented reality, and both are possible with a device called the Reality Mediator. Over the past two decades, we have designed, built, worn,...
Steve Mann, James Fung
MOBICOM
2006
ACM
14 years 1 months ago
Distributed channel management in uncoordinated wireless environments
Wireless 802.11 hotspots have grown in an uncoordinated fashion with highly variable deployment densities. Such uncoordinated deployments, coupled with the difficulty of implemen...
Arunesh Mishra, Vivek Shrivastava, Dheeraj Agrawal...
HICSS
2003
IEEE
144views Biometrics» more  HICSS 2003»
14 years 1 months ago
Democracy Functions of Information Technology
Information Technology, IT, may play an important part in any community as a supporting tool in the democratic process. The conditions for that to happen are primarily a genuine w...
Gunnar Lidén, Anders Avdic
SIGMOD
1997
ACM
166views Database» more  SIGMOD 1997»
13 years 12 months ago
The InfoSleuth Project
The goal of the InfoSleuth project at MCC is to exploit and synthesize new technologies into a uni ed system that retrieves and processes information in an ever-changing network o...
Roberto J. Bayardo Jr., William Bohrer, Richard S....