Sciweavers

520 search results - page 29 / 104
» Playing to Retain the Advantage
Sort
View
SP
2005
IEEE
149views Security Privacy» more  SP 2005»
14 years 2 months ago
Distributed Proving in Access-Control Systems
We present a distributed algorithm for assembling a proof that a request satisfies an access-control policy expressed in a formal logic, in the tradition of Lampson et al. [16]. ...
Lujo Bauer, Scott Garriss, Michael K. Reiter
ACMACE
2005
ACM
14 years 2 months ago
The CaveUT system: immersive entertainment based on a game engine
We describe the development of the CaveUT system, which is a software supporting immersive virtual reality installations based on the Unreal Tournament game engine. CaveUT impleme...
Jeffrey Jacobson, Marc Le Renard, Jean-Luc Lugrin,...
UIST
2005
ACM
14 years 2 months ago
Automatic image retargeting with fisheye-view warping
Image retargeting is the problem of adapting images for display on devices different than originally intended. This paper presents a method for adapting large images, such as thos...
Feng Liu, Michael Gleicher
MICCAI
2005
Springer
14 years 2 months ago
Dynamic 3D Ultrasound and MR Image Registration of the Beating Heart
Real-time three-dimensional ultrasound (RT3D US) is an ideal imaging modality for the diagnosis of cardiac disease. RT3D US is a flexible, inexpensive, non-invasive tool that provi...
Xishi Huang, Nicholas A. Hill, Jing Ren, Gerard Gu...
TSD
2004
Springer
14 years 2 months ago
Acoustic and Linguistic Information Based Chinese Prosodic Boundary Labelling
The paper analyzes both acoustic and linguistic features with different Chinese prosodic boundaries. Then a rule-learning approach was used to do the prosodic boundary labelling. ...
Jianhua Tao