Sciweavers

796 search results - page 51 / 160
» Spoofing prevention method
Sort
View
ICAT
2003
IEEE
14 years 3 months ago
Interaction Model between Elastic Objects for Accurate Haptic Display
The simulation of organ-organ interaction is indispensable for practical and advanced medical VR simulator such as open surgery and indirect palpation. This paper gives a method t...
Yoshihiro Kuroda, Megumi Nakao, Tomohiro Kuroda, H...
TLDI
2003
ACM
110views Formal Methods» more  TLDI 2003»
14 years 3 months ago
Type-safe multithreading in cyclone
We extend Cyclone, a type-safe polymorphic language at vel of abstraction, with threads and locks. Data races can violate type safety in Cyclone. An extended type system staticall...
Dan Grossman
UIST
2003
ACM
14 years 3 months ago
Considering the direction of cursor movement for efficient traversal of cascading menus
Cascading menus are commonly seen in most GUI systems. However, people sometimes choose the wrong items by mistake, or become frustrated when submenus pop up unnecessarily. This p...
Masatomo Kobayashi, Takeo Igarashi
CODES
2002
IEEE
14 years 2 months ago
Worst-case performance analysis of parallel, communicating software processes
In this paper we present a method to perform static timing analysis of SystemC models, that describe parallel, communicating software processes.The paper combines a worstcase exec...
Axel Siebenborn, Oliver Bringmann, Wolfgang Rosens...
EH
2000
IEEE
98views Hardware» more  EH 2000»
14 years 2 months ago
Scalable Evolvable Hardware Applied to Road Image Recognition
Evolvable Hardware (EHW) has the potential to become a new target hardware for complex real-world applications. However, there are several problems that would have to be solved to...
Jim Torresen