Sciweavers

4390 search results - page 814 / 878
» Part Objects and their Location
Sort
View
ISCC
2006
IEEE
112views Communications» more  ISCC 2006»
14 years 4 months ago
The Precision and Energetic Cost of Snapshot Estimates in Wireless Sensor Networks
— Even for a specific application, the design space of wireless sensor networks is enormous, and traditional disciplinary boundaries are disappearing in the search for efficien...
Paul G. Flikkema
ISMAR
2006
IEEE
14 years 4 months ago
Implementation of god-like interaction techniques for supporting collaboration between outdoor AR and indoor tabletop users
This paper presents a new interaction metaphor we have termed “god-like interaction”. This is a metaphor for improved communication of situational and navigational information...
Aaron Stafford, Wayne Piekarski, Bruce H. Thomas
CASES
2006
ACM
14 years 4 months ago
Supporting precise garbage collection in Java Bytecode-to-C ahead-of-time compiler for embedded systems
A Java bytecode-to-C ahead-of-time compiler (AOTC) can improve the performance of a Java virtual machine (JVM) by translating bytecode into C code, which is then compiled into mac...
Dong-Heon Jung, Sung-Hwan Bae, Jaemok Lee, Soo-Moo...
ETRA
2006
ACM
114views Biometrics» more  ETRA 2006»
14 years 4 months ago
Visual attention in 3D video games
Understanding players’ visual attention patterns within an interactive 3D game environment is an important research area that can improve game level design and graphics. Several...
Su Yan, Magy Seif El-Nasr
PLDI
2006
ACM
14 years 4 months ago
DieHard: probabilistic memory safety for unsafe languages
Applications written in unsafe languages like C and C++ are vulnerable to memory errors such as buffer overflows, dangling pointers, and reads of uninitialized data. Such errors ...
Emery D. Berger, Benjamin G. Zorn