Sciweavers

6693 search results - page 1114 / 1339
» On an anytime algorithm for control
Sort
View
SENSYS
2005
ACM
14 years 2 months ago
A new approach for establishing pairwise keys for securing wireless sensor networks
Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography in order to make them secure. Integral to this is the exchange of unique symme...
Arno Wacker, Mirko Knoll, Timo Heiber, Kurt Rother...
SI3D
2005
ACM
14 years 2 months ago
A camera-based interface for interaction with mobile handheld computers
Recent advances in mobile computing allow the users to deal with 3D interactive graphics on handheld computers. Although the computing resources and screen resolutions grow steadi...
Martin Hachet, Joachim Pouderoux, Pascal Guitton
SIGCOMM
2005
ACM
14 years 2 months ago
OpenDHT: a public DHT service and its uses
Large-scale distributed systems are hard to deploy, and distributed hash tables (DHTs) are no exception. To lower the barriers facing DHT-based applications, we have created a pub...
Sean C. Rhea, Brighten Godfrey, Brad Karp, John Ku...
SIGCSE
2005
ACM
125views Education» more  SIGCSE 2005»
14 years 2 months ago
Efficient use of robots in the undergraduate curriculum
In this paper we describe how a single Khepera II robot was used for an assignment in a senior level course on graphical user interface implementation. The assignment required eac...
Judith Challinger
UIST
2005
ACM
14 years 2 months ago
Zoom-and-pick: facilitating visual zooming and precision pointing with interactive handheld projectors
Designing interfaces for interactive handheld projectors is an exiting new area of research that is currently limited by two problems: hand jitter resulting in poor input control,...
Clifton Forlines, Ravin Balakrishnan, Paul A. Bear...
« Prev « First page 1114 / 1339 Last » Next »