Sciweavers

811 search results - page 146 / 163
» Modeling and Virtualization for Secure Computing Environment...
Sort
View
CHI
2001
ACM
14 years 9 months ago
The impact of eye gaze on communication using humanoid avatars
In this paper we describe an experiment designed to investigate the importance of eye gaze in humanoid avatars representing people engaged in conversation. We compare responses to...
Maia Garau, Mel Slater, Simon Bee, Martina Angela ...
ICDS
2009
IEEE
14 years 3 months ago
Anticipating the Digital University
The University of the Digital Society is based on interactions that facilitate learning in a new pragmatic context. Catalysts involved in the learning process replace the traditio...
Mihai Nadin
CCS
2010
ACM
13 years 6 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
COMPGEOM
2004
ACM
14 years 12 days ago
Continuous path verification in multi-axis NC-machining
We introduce a new approach to the problem of collision detection between a rotating milling-cutter of an NC-machine and a model of a solid workpiece, as the rotating cutter conti...
Ron Wein, Oleg Ilushin, Gershon Elber, Dan Halperi...
CVPR
2008
IEEE
14 years 10 months ago
Sketching in the air: A vision-based system for 3D object design
3D object design has many applications including flexible 3D sketch input in CAD, computer game, webpage content design, image based object modeling, and 3D object retrieval. Most...
Yu Chen, Jianzhuang Liu, Xiaoou Tang