Sciweavers

2564 search results - page 341 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
CASSIS
2004
Springer
14 years 2 days ago
Verification of Safety Properties in the Presence of Transactions
The JAVA CARD transaction mechanism can ensure that a sequence of statements either is executed to completion or is not executed at all. Transactions make verification of JAVA CARD...
Reiner Hähnle, Wojciech Mostowski
CHI
2008
ACM
13 years 10 months ago
Genetic algorithm can optimize hierarchical menus
Hierarchical menus are now ubiquitous. The performance of the menu depends on many factors: structure, layout, colors and so on. There has been extensive research on novel menus, ...
Shouichi Matsui, Seiji Yamada
FGR
2006
IEEE
112views Biometrics» more  FGR 2006»
14 years 2 months ago
Self Correcting Tracking for Articulated Objects
Hand detection and tracking play important roles in human computer interaction (HCI) applications, as well as surveillance. We propose a self initializing and self correcting trac...
M. Baris Caglar, Niels da Vitoria Lobo
CHI
2005
ACM
14 years 8 months ago
A study on the manipulation of 2D objects in a projector/camera-based augmented reality environment
Are the object manipulation techniques traditionally used in head?mounted displays (HMDs) applicable to augmented reality based projection systems? This paper examines the differe...
Stephen Voida, Mark Podlaseck, Rick Kjeldsen, Clau...
SIGCOMM
2009
ACM
14 years 2 months ago
Game action based power management for multiplayer online game
Current mobile devices embrace a wide range of functionalities including high speed network support, hardware accelerated 3D graphics, and multimedia capabilities. These capabilit...
Bhojan Anand, Akkihebbal L. Ananda, Mun Choon Chan...