Sciweavers

8623 search results - page 1658 / 1725
» Software engineering for secure systems
Sort
View
VISUALIZATION
2003
IEEE
14 years 2 months ago
A Constraint-Based Technique for Haptic Volume Exploration
We present a haptic rendering technique that uses directional constraints to facilitate enhanced exploration modes for volumetric datasets. The algorithm restricts user motion in ...
Milan Ikits, J. Dean Brederson, Charles D. Hansen,...
WISE
2003
Springer
14 years 2 months ago
A Rule Based Approach to the Service Composition Life-Cycle
Web services are becoming the prominent paradigm for distributed computing and electronic business. This has raised the opportunity for service providers and application developer...
Jian Yang, Mike P. Papazoglou, Bart Orriëns, ...
KCAP
2003
ACM
14 years 2 months ago
Learning programs from traces using version space algebra
While existing learning techniques can be viewed as inducing programs from examples, most research has focused on rather narrow classes of programs, e.g., decision trees or logic ...
Tessa A. Lau, Pedro Domingos, Daniel S. Weld
UIST
2003
ACM
14 years 2 months ago
Classroom BRIDGE: using collaborative public and desktop timelines to support activity awareness
Classroom BRIDGE supports activity awareness by facilitating planning and goal revision in collaborative, project-based middle school science. It integrates largescreen and deskto...
Craig H. Ganoe, Jacob P. Somervell, Dennis C. Neal...
VRST
2003
ACM
14 years 2 months ago
Alternative reality: a new platform for virtual reality art
Virtual Reality Art involves the design of artificial worlds that offer new experiences to spectators. An important aspect for the development of VR Art installations is the princ...
Marc Cavazza, Simon Hartley, Jean-Luc Lugrin, Mika...
« Prev « First page 1658 / 1725 Last » Next »