Sciweavers

2399 search results - page 435 / 480
» On Authentication between Human and Computer
Sort
View
MM
2004
ACM
158views Multimedia» more  MM 2004»
14 years 1 months ago
"Sousveillance": inverse surveillance in multimedia imaging
This is a personal narrative that began 30 years ago as a childhood hobby, of wearing and implanting various sensors, effectors, and multimedia computation in order to re-define...
Steve Mann
APGV
2006
ACM
144views Visualization» more  APGV 2006»
13 years 11 months ago
Efficient selective rendering of participating media
Realistic image synthesis is the process of computing photorealistic images which are perceptually and measurably indistinguishable from real-world images. In order to obtain high...
Oscar Anson, Veronica Sundstedt, Diego Gutierrez, ...
MVA
2000
164views Computer Vision» more  MVA 2000»
13 years 9 months ago
Visual Screen: Transforming an Ordinary Screen into a Touch Screen
Touch screens are very convenient because one can directly point to where it is interesting. This paper presents an inexpensive technique to transform an ordinary screen into a to...
Zhengyou Zhang, Ying Shan
AIS
2007
Springer
13 years 8 months ago
Crafts praxis for critical wearables design
This paper treats the contemporary craft market as an under-researched resource for wearable computing, and investigates the alternative values and experiences that contemporary c...
Sarah Kettley
ISCI
2000
100views more  ISCI 2000»
13 years 7 months ago
A neurobiological interpretation of semiotics: meaning, representation, and information
The branch of semiotics called semantics deals with the relation between meanings and representations, widely known as the symbol grounding problem. The other branches of semiotic...
Walter J. Freeman