Sciweavers

1927 search results - page 360 / 386
» An Access Control Model for Location based Services
Sort
View
EUROGRAPHICS
2010
Eurographics
15 years 7 months ago
Implicit Blending Revisited
Blending is both the strength and the weakness of functionally based implicit surfaces (such as F-reps or softobjects). While it gives them the unique ability to smoothly merge in...
Adrien Bernhardt, Loic Barthe, Marie-Paule Cani, B...
ISCC
2006
IEEE
112views Communications» more  ISCC 2006»
15 years 3 months ago
The Precision and Energetic Cost of Snapshot Estimates in Wireless Sensor Networks
— Even for a specific application, the design space of wireless sensor networks is enormous, and traditional disciplinary boundaries are disappearing in the search for efficien...
Paul G. Flikkema
CCS
2008
ACM
14 years 12 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
CGF
1998
213views more  CGF 1998»
14 years 9 months ago
Interactive Construction and Animation of Layered Elastically Deformable Characters
An interactive system is described for creating and animating deformable 3D characters. By using a hybrid layered model of kinematic and physics-based components together with an ...
Russell Turner, Enrico Gobbetti
RTSS
2005
IEEE
15 years 3 months ago
Multi-Granularity Resource Reservations
Resource reservation has been recently supported by many real-time operating systems to provide applications with guaranteed and timely access to system resources. Typically, rese...
Saowanee Saewong, Ragunathan Rajkumar