Sciweavers

132 search results - page 22 / 27
» Identifying Bullies with a Computer Game
Sort
View
MOBICOM
2012
ACM
12 years 3 days ago
Distinguishing users with capacitive touch communication
As we are surrounded by an ever-larger variety of post-PC devices, the traditional methods for identifying and authenticating users have become cumbersome and time-consuming. In t...
Tam Vu, Akash Baid, Simon Gao, Marco Gruteser, Ric...
CHI
2009
ACM
14 years 10 months ago
In CMC we trust: the role of similarity
This paper examines how different forms of linguistic similarity in a text-chat environment relate to the establishment of interpersonal trust. Sixty-two pairs played an iterative...
Lauren E. Scissors, Alastair J. Gill, Kathleen Ger...
FDG
2009
ACM
14 years 4 months ago
System for Automated Interactive Lighting (SAIL)
Successful lighting in video games is more than a physically accurate illumination model. Aesthetics and function are of equal or greater importance. Lighting designers may deviat...
Joseph A. Zupko, Magy Seif El-Nasr
SCA
2007
14 years 1 days ago
Smooth movers: perceptually guided human motion simulation
To animate a character, a number of poses are displayed in quick succession in order to create the illusion of motion. For most real-time applications, such as games, the pose upd...
Rachel McDonnell, Fiona N. Newell, Carol O'Sulliva...
TON
2002
75views more  TON 2002»
13 years 9 months ago
Optimal retrial and timeout strategies for accessing network resources
The notion of timeout (namely, the maximal time to wait before retrying an action) turns up in many networking contexts, such as packet transmission, connection establishment, etc....
Lavy Libman, Ariel Orda