Sciweavers

811 search results - page 106 / 163
» Modeling and Virtualization for Secure Computing Environment...
Sort
View
VMV
2004
126views Visualization» more  VMV 2004»
13 years 10 months ago
Top-Down Visual Attention for Efficient Rendering of Task Related Scenes
The perception of a virtual environment depends on the user and the task the user is currently performing in that environment. Models of the human visual system can thus be exploi...
Veronica Sundstedt, Alan Chalmers, Kirsten Cater, ...
SACMAT
2010
ACM
13 years 7 months ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino
CGF
2007
101views more  CGF 2007»
13 years 9 months ago
Consistent Viewing and Interaction for Multiple Users in Projection-Based VR Systems
In projection-based Virtual Reality (VR) systems, typically only one headtracked user views stereo images rendered from the correct view position. For other users, who are present...
Gerwin de Haan, Rene Molenaar, Michal Koutek, Frit...
ICEIS
2000
IEEE
14 years 1 months ago
Architectural Considerations with Distributed Computing
We understand distributed systems as a collection of distributed computation resources that work together as one harmonious system. It is the great achievement of computer network...
Yibing Wang, Robert M. Hyatt, Barrett R. Bryant
IWMM
2004
Springer
90views Hardware» more  IWMM 2004»
14 years 2 months ago
Automatic heap sizing: taking real memory into account
Heap size has a huge impact on the performance of garbage collected applications. A heap that barely meets the application’s needs causes excessive GC overhead, while a heap tha...
Ting Yang, Matthew Hertz, Emery D. Berger, Scott F...