Sciweavers

563 search results - page 108 / 113
» Using Real Objects to Communicate with Virtual Characters
Sort
View
CCR
2010
133views more  CCR 2010»
13 years 8 months ago
The role of network trace anonymization under attack
In recent years, academic literature has analyzed many attacks on network trace anonymization techniques. These attacks usually correlate external information with anonymized data...
Martin Burkhart, Dominik Schatzmann, Brian Trammel...
HPDC
1996
IEEE
14 years 18 days ago
Legion - A View from 50, 000 Feet
' The coming of giga-bit networks makes possible the realization ofa single nationwide virtual computer comprised of a variety of geographically distributed highpe6ormance mac...
Andrew S. Grimshaw, William A. Wulf
ADHOCNETS
2009
Springer
13 years 11 months ago
Efficient Distribution of Large Files in UMTS Supported by Network Coded M2M Data Transfer with Multiple Generations
This paper is a sequel of previous work, in which we have studied the traffic management problem in UMTS. The main objective was to improve the spectral efficiency of cellular netw...
Larissa Popova, Wolfgang H. Gerstacker, Wolfgang K...
INFOVIS
2005
IEEE
14 years 2 months ago
Importance-Driven Visualization Layouts for Large Time Series Data
Time series are an important type of data with applications in virtually every aspect of the real world. Often a large number of time series have to be monitored and analyzed in p...
Ming C. Hao, Umeshwar Dayal, Daniel A. Keim, Tobia...
ISMAR
2002
IEEE
14 years 1 months ago
Practical Solutions for Calibration of Optical See-Through Devices
One of the most crucial tasks in a see-through augmented reality (AR) system is to register the virtual objects with the real world through a transparent display. The importance s...
Yakup Genc, Mihran Tuceryan, Nassir Navab