Sciweavers

47 search results - page 8 / 10
» Overhearing and Direct Interactions: Point of View of an Act...
Sort
View
IJNSEC
2006
205views more  IJNSEC 2006»
13 years 7 months ago
A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks
Nodes in a mobile ad hoc network need to thwart various attacks and malicious activities. This is especially true for the ad hoc environment where there is a total lack of central...
Animesh Patcha, Jung-Min Park
ICMCS
1994
IEEE
123views Multimedia» more  ICMCS 1994»
13 years 12 months ago
Casual Collaboration
As computers are increasingly used to mediate social interaction, tools are needed not only to support direct communication, but also to create a richer social environment for the...
Judith S. Donath
SI3D
1999
ACM
14 years 1 days ago
UniCam - 2D gestural camera controls for 3D environments
We present a novel approach to controlling a virtual 3D camera with a 2D mouse or stylus input device that is based on gestural interaction. Our approach to 3D camera manipulation...
Robert C. Zeleznik, Andrew S. Forsberg
JNCA
1998
108views more  JNCA 1998»
13 years 7 months ago
User interface for video observation over the internet
We present the design and application of a system for live video transmission and remote camera control over the World Wide Web. Extensive testing of the Internet Video Server IV...
Bor Prihavec, Franc Solina
ACMDIS
2006
ACM
14 years 1 months ago
Morphome: a constructive field study of proactive information technology in the home
This paper presents the main results of a three-year long field and design study of proactive information technology in the home. This technology uses sensors to track human activ...
Ilpo Koskinen, Kristo Kuusela, Katja Battarbee, An...