Sciweavers

2564 search results - page 341 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
133
Voted
CASSIS
2004
Springer
15 years 6 months ago
Verification of Safety Properties in the Presence of Transactions
The JAVA CARD transaction mechanism can ensure that a sequence of statements either is executed to completion or is not executed at all. Transactions make verification of JAVA CARD...
Reiner Hähnle, Wojciech Mostowski
108
Voted
CHI
2008
ACM
15 years 4 months ago
Genetic algorithm can optimize hierarchical menus
Hierarchical menus are now ubiquitous. The performance of the menu depends on many factors: structure, layout, colors and so on. There has been extensive research on novel menus, ...
Shouichi Matsui, Seiji Yamada
FGR
2006
IEEE
112views Biometrics» more  FGR 2006»
15 years 8 months ago
Self Correcting Tracking for Articulated Objects
Hand detection and tracking play important roles in human computer interaction (HCI) applications, as well as surveillance. We propose a self initializing and self correcting trac...
M. Baris Caglar, Niels da Vitoria Lobo
133
Voted
CHI
2005
ACM
16 years 2 months ago
A study on the manipulation of 2D objects in a projector/camera-based augmented reality environment
Are the object manipulation techniques traditionally used in head?mounted displays (HMDs) applicable to augmented reality based projection systems? This paper examines the differe...
Stephen Voida, Mark Podlaseck, Rick Kjeldsen, Clau...
125
Voted
SIGCOMM
2009
ACM
15 years 8 months ago
Game action based power management for multiplayer online game
Current mobile devices embrace a wide range of functionalities including high speed network support, hardware accelerated 3D graphics, and multimedia capabilities. These capabilit...
Bhojan Anand, Akkihebbal L. Ananda, Mun Choon Chan...