Sciweavers

3348 search results - page 661 / 670
» Tracking Objects Using Recognition
Sort
View
IPPS
1998
IEEE
14 years 29 days ago
Performance Analysis of a Fault-Tolerant Scheme for Location Management of Mobile Hosts
We consider the problem of location management of mobile users. The objective is to keep track of the mobile users in order to deliver calls. The IS-41 is a simple strategy for loc...
Saad Biaz, Nitin H. Vaidya
CHI
1998
ACM
14 years 29 days ago
Triangles: Tangible Interface for Manipulation and Exploration of Digital Information Topography
This paper presents a system for interacting with digital information, called Triangles. The Triangles system is a physical/digital construction kit, which allows users to use two...
Matthew G. Gorbet, Maggie Orth, Hiroshi Ishii
CHI
1997
ACM
14 years 28 days ago
A Computer Participant in Musical Improvisation
the changing roles of participants in a musical improvisation and synchronously generate appropriate contributions of its own. Musical improvisation is a collaborative activity ana...
William F. Walker
USENIX
2007
13 years 11 months ago
Dynamic Spyware Analysis
Spyware is a class of malicious code that is surreptitiously installed on victims’ machines. Once active, it silently monitors the behavior of users, records their web surfing ...
Manuel Egele, Christopher Kruegel, Engin Kirda, He...
FLAIRS
2006
13 years 10 months ago
Cognitive Simulation in Virtual Patients
We present an overview of the Virtual Patient project at the University of Maryland, which is developing a cognitive model of humans experiencing various states of health and dise...
Sergei Nirenburg, Marjorie McShane, Stephen Beale,...