Sciweavers

2714 search results - page 191 / 543
» Under the table interaction
Sort
View
143
Voted
ICCSA
2003
Springer
15 years 9 months ago
Camera Models and Optical Systems Used in Computer Graphics: Part II, Image-Based Techniques
Abstract. In our companion paper [5], we described the optics underlying camera models that have been used in computer graphics, and presented object space techniques for rendering...
Brian A. Barsky, Daniel R. Horn, Stanley A. Klein,...
CHI
2009
ACM
16 years 4 months ago
Understanding teamwork in high-risk domains through analysis of errors
Trauma care is an example of dynamic, complex, and safety-critical teamwork. The staff in trauma centers works under time pressure and lacks effective information technologies to ...
Aleksandra Sarcevic
90
Voted
CHI
2002
ACM
16 years 4 months ago
The philosophy and design of socially adept technologies
Context-aware artifacts can be seen as an important class of socially adept technologies. In this paper, we focus on the fact that disregarding trivial notions of context, context...
Stephen Marsh, Lucy T. Nowell, John F. Meech, Kers...
126
Voted
ACHI
2008
IEEE
15 years 10 months ago
Adaptive Self-Assessment Trying to Reduce Fear
— Almost everyone has experienced fear at least once in their life because of a test. Fear can positively mobilise students, when it is under control. However, when fear becomes ...
Anastasios A. Economides, Christos N. Moridis
168
Voted
APCHI
2008
IEEE
15 years 10 months ago
Denial of Sleeping: Performance Analysis and Counteracting Strategy
Denial of Sleeping is a novel type of potential attacks in wireless network. The object of the attack is a sensor node’s power supply. To make sensors inexpensive so that they ca...
Vladimir V. Shakhov, Hyunseung Choo