Sciweavers

12375 search results - page 2468 / 2475
» Application networking on peer-to-peer networks
Sort
View
TOH
2010
97views more  TOH 2010»
14 years 8 months ago
A Frequency-Domain Analysis of Haptic Gratings
—The detectability and discriminability of virtual haptic gratings were analyzed in the frequency domain. Detection (Exp. 1) and discrimination (Exp. 2) thresholds for virtual ha...
Steven A. Cholewiak, Kwangtaek Kim, Hong Z. Tan, B...
UMUAI
2010
136views more  UMUAI 2010»
14 years 8 months ago
Towards affective camera control in games
Information about interactive virtual environments, such as games, is perceived by users through a virtual camera. While most interactive applications let users control the camera,...
Georgios N. Yannakakis, Héctor Perez Mart&i...
BMCBI
2010
189views more  BMCBI 2010»
14 years 8 months ago
solQTL: a tool for QTL analysis, visualization and linking to genomes at SGN database
Background: A common approach to understanding the genetic basis of complex traits is through identification of associated quantitative trait loci (QTL). Fine mapping QTLs require...
Isaak Y. Tecle, Naama Menda, Robert M. Buels, Esth...
ACSAC
2010
IEEE
14 years 8 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
ASIACRYPT
2010
Springer
14 years 8 months ago
Structured Encryption and Controlled Disclosure
We consider the problem of encrypting structured data (e.g., a web graph or a social network) in such a way that it can be efficiently and privately queried. For this purpose, we ...
Melissa Chase, Seny Kamara
« Prev « First page 2468 / 2475 Last » Next »