Sciweavers

1219 search results - page 29 / 244
» Where to Look Next
Sort
View
PODS
2005
ACM
104views Database» more  PODS 2005»
14 years 7 months ago
Views and queries: determinacy and rewriting
We investigate the question of whether a query can be answered using a set V of views. We first define the problem in information-theoretic terms: we say that V determines if V pr...
Luc Segoufin, Victor Vianu
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
14 years 2 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
COST
2007
Springer
163views Multimedia» more  COST 2007»
14 years 1 months ago
Affordances and Cognitive Walkthrough for Analyzing Human-Virtual Human Interaction
This study investigates how the psychological notion of affordance, known from human computer interface design, can be adopted for the analysis and design of communication of a use...
Zsófia Ruttkay, Rieks op den Akker
ICA3PP
2007
Springer
14 years 1 months ago
AnyServer: Ubiquitous Real-Time Multimedia Communication System
Ubiquitous communications require wireless networking and infrastructure network support. The first step is to look at how the different available technologies will integrate and w...
Weijia Jia
CW
2006
IEEE
14 years 1 months ago
An Interactive Mixed Reality Framework for Virtual Humans
In this paper, we present a simple and robust Mixed Reality (MR) framework that allows for real-time interaction with Virtual Humans in real and virtual environments under consist...
Arjan Egges, George Papagiannakis, Nadia Magnenat-...