Sciweavers

5511 search results - page 897 / 1103
» Security for Network Places
Sort
View
AINA
2009
IEEE
15 years 8 months ago
Layer-Based Dome Contents Creation Using Scenario Description Language
—In recent years, dome display has become popular, and it is desired to establish a method to create dome image contents easily. In this study, psychophysical experiment was cond...
Tetsuro Ogi, Daisuke Furuyama, Tetsuro Fujise
CDC
2009
IEEE
177views Control Systems» more  CDC 2009»
15 years 8 months ago
A control theoretic approach to noncooperative game design
— This paper investigates design of noncooperative games from a control theoretic perspective. Pricing mechanisms are used as a design tool to ensure that the Nash equilibrium of...
Tansu Alpcan, Lacra Pavel, Nem Stefanovic
139
Voted
UM
2001
Springer
15 years 8 months ago
User Modelling in I-Help: What, Why, When and How
This paper describes user modelling in I-Help, a system to facilitate communication amongst learners. There are two I-Help components: Private and Public Discussions. In the Privat...
Susan Bull, Jim E. Greer, Gordon I. McCalla, Lori ...
PLDI
1999
ACM
15 years 8 months ago
Enhanced Code Compression for Embedded RISC Processors
This paper explores compiler techniques for reducing the memory needed to load and run program executables. In embedded systems, where economic incentives to reduce both ram and r...
Keith D. Cooper, Nathaniel McIntosh
HUC
1999
Springer
15 years 8 months ago
InfoStick: An Interaction Device for Inter-Appliance Computing
Abstract. Many electric appliances have recently become network reachable, and we would receive better services from them if we could use them in combination. We have therefore dev...
Naohiko Kohtake, Jun Rekimoto, Yuichiro Anzai