Sciweavers

12 search results - page 1 / 3
» Comet and target ghost: techniques for selecting moving targ...
Sort
View
CHI
2011
ACM
12 years 8 months ago
Comet and target ghost: techniques for selecting moving targets
Numerous applications such as simulations, air traffic control systems, and video surveillance systems are inherently composed of spatial objects that move in a scene. In many ins...
Khalad Hasan, Tovi Grossman, Pourang Irani
RAID
2009
Springer
13 years 11 months ago
Protecting a Moving Target: Addressing Web Application Concept Drift
Because of the ad hoc nature of web applications, intrusion detection systems that leverage machine learning techniques are particularly well-suited for protecting websites. The re...
Federico Maggi, William K. Robertson, Christopher ...
CHI
2007
ACM
14 years 5 months ago
Shift: a technique for operating pen-based interfaces using touch
Retrieving the stylus of a pen-based device takes time and requires a second hand. Especially for short intermittent interactions many users therefore choose to use their bare fin...
Daniel Vogel, Patrick Baudisch
ICRA
2007
IEEE
146views Robotics» more  ICRA 2007»
13 years 11 months ago
Interactive Motion Control of Deformable Objects Using Localized Optimal Control
—In this paper we present a novel interactive method and interface techniques for controlling the behavior of physically-based simulation of deformable objects. The goal of our r...
Hongjun Jeon, Min-Hyung Choi
NIPS
1996
13 years 6 months ago
Analog VLSI Circuits for Attention-Based, Visual Tracking
A one-dimensional, visual tracking chip has been implemented using neuromorphic,analog VLSI techniques to modelselective visual attention in the control of saccadic and smooth pur...
Timothy K. Horiuchi, Tonia G. Morris, Christof Koc...