Sciweavers

4118 search results - page 658 / 824
» Mechanisms for usage control
Sort
View
CHI
2010
ACM
15 years 11 months ago
Cord input: an intuitive, high-accuracy, multi-degree-of-freedom input method for mobile devices
A cord, although simple in form, has many interesting physical affordances that make it powerful as an input device. Not only can a length of cord be grasped in different location...
Julia Schwarz, Chris Harrison, Scott E. Hudson, Je...
CHI
2010
ACM
15 years 11 months ago
Skinput: appropriating the body as an input surface
We present Skinput, a technology that appropriates the human body for acoustic transmission, allowing the skin to be used as an input surface. In particular, we resolve the locati...
Chris Harrison, Desney S. Tan, Dan Morris
AINA
2009
IEEE
15 years 11 months ago
A SOA-Based Collaborative Environment for Clinical Trials on Neglected Diseases
—The WebInVivo project aims at providing automated support for clinical research on neglected diseases. It includes mechanisms for (a) sharing and reusing clinical trial assets, ...
Maria Beatriz Felgar de Toledo, Olga Nabuco, Marco...
SI3D
2009
ACM
15 years 11 months ago
Granular visibility queries on the GPU
Efficient visibility queries are key in many interactive rendering techniques, such as occlusion culling, level of detail determination, and perceptual rendering. The occlusion q...
Thomas Engelhardt, Carsten Dachsbacher
ESORICS
2009
Springer
15 years 11 months ago
Hide and Seek in Time - Robust Covert Timing Channels
Abstract. Covert timing channels aim at transmitting hidden messages by controlling the time between transmissions of consecutive payload packets in overt network communication. Pr...
Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-...