Sciweavers

3712 search results - page 579 / 743
» Role-Based Access Control
Sort
View
SI3D
2005
ACM
15 years 8 months ago
What you see is what you snap: snapping to geometry deformed on the GPU
We present a simple yet effective snapping technique for constraining the motion of the cursor of an input device to the surface of 3D models whose geometry is arbitrarily deforme...
Harlen Costa Batagelo, Shin-Ting Wu
SIGCSE
2005
ACM
125views Education» more  SIGCSE 2005»
15 years 8 months ago
Efficient use of robots in the undergraduate curriculum
In this paper we describe how a single Khepera II robot was used for an assignment in a senior level course on graphical user interface implementation. The assignment required eac...
Judith Challinger
WOWMOM
2005
ACM
108views Multimedia» more  WOWMOM 2005»
15 years 8 months ago
Reducing Inter-Cluster TDMA Interference by Adaptive MAC Allocation in Sensor Networks
This paper presents a Self-Reorganizing Slot Allocation (SRSA) mechanism for TDMA based Medium Access Control (MAC) in multi-cluster sensor networks. The aim is to provide a MAC l...
Tao Wu, Subir K. Biswas
AVBPA
2005
Springer
303views Biometrics» more  AVBPA 2005»
15 years 8 months ago
Indexing Biometric Databases Using Pyramid Technique
Abstract. Biometric identification has emerged as a reliable means of controlling access to both physical and virtual spaces. In spite of the rapid proliferation of large-scale dat...
Amit Mhatre, Sharat Chikkerur, Venu Govindaraju
CBSE
2005
Springer
15 years 8 months ago
Performance Prediction of J2EE Applications Using Messaging Protocols
Abstract. Predicting the performance of component-based applications is difficult due to the complexity of the underlying component technology. This problem is exacerbated when a m...
Yan Liu, Ian Gorton