Sciweavers

2399 search results - page 433 / 480
» On Authentication between Human and Computer
Sort
View
NETGAMES
2004
ACM
14 years 1 months ago
Accuracy in dead-reckoning based distributed multi-player games
Distributed multi-player games use dead reckoning vectors to intimate other (at a distance) participating players about the movement of any entity by a controlling player. The dea...
Sudhir Aggarwal, Hemant Banavar, Amit Khandelwal, ...
DGO
2007
121views Education» more  DGO 2007»
13 years 9 months ago
Social capital and ICT adoption in the public sector
Although the research domain on social capital and the adoption of Information and Communication Technologies (ICTs) is relatively immature, there is a fast growing body of eviden...
Noor Huijboom
I3
2007
13 years 9 months ago
Identity: How to name it, How to find it
The main objective of this work is to exploit the relationship between the information findability problem and a subject-based organization of information. Identification of a sub...
Christo Dichev, Darina Dicheva, Jan Fischer
FUNGAMES
2010
13 years 9 months ago
Recognizing self in puppet controlled virtual avatars
Recent work in neuroscience suggests that there is a common coding in the brain between perception, imagination and execution of movement. Further, this common coding is considere...
Ali Mazalek, Michael Nitsche, Sanjay Chandrasekhar...
AI
2007
Springer
13 years 8 months ago
Learning, detection and representation of multi-agent events in videos
In this paper, we model multi-agent events in terms of a temporally varying sequence of sub-events, and propose a novel approach for learning, detecting and representing events in...
Asaad Hakeem, Mubarak Shah