Sciweavers

2025 search results - page 372 / 405
» Theory as Game: Designing the Game Game
Sort
View
AVI
2008
13 years 11 months ago
End-user visualizations
Computer visualization has advanced dramatically over the last few years, partially driven by the exploding video game market. 3D hardware acceleration has reached the point where...
Alexander Repenning, Andri Ioannidou
NSDI
2008
13 years 11 months ago
iPhish: Phishing Vulnerabilities on Consumer Electronics
As consumer electronic devices with embedded browsers become popular, financial institutions and online merchants set up websites to accommodate visitors using these devices. Thes...
Yuan Niu, Francis Hsu, Hao Chen
ACMACE
2008
ACM
13 years 10 months ago
Extracting camera-control requirements and camera movement generation in a 3D virtual environment
This paper proposes a new method to generate smooth camera movement that is collision-free in a three-dimensional virtual environment. It generates a set of cells based on cell de...
Hirofumi Hamazaki, Shinya Kitaoka, Maya Ozaki, Yos...
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
13 years 10 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
DAC
2005
ACM
13 years 10 months ago
Cognitive radio techniques for wide area networks
The cellular wireless market has begun the transition to data centric services including high speed internet access, video, high quality audio, and gaming. Communications technolo...
William Krenik, Anuj Batra