Sciweavers

4166 search results - page 285 / 834
» Automating the constraining process
Sort
View
OOPSLA
2001
Springer
15 years 8 months ago
Multitasking without Compromise: A Virtual Machine Evolution
The Multitasking Virtual Machine (called from now on simply MVM) is a modification of the Java™ virtual machine. It enables safe, secure, and scalable multitasking. Safety is ac...
Grzegorz Czajkowski, Laurent Daynès
FGR
2000
IEEE
386views Biometrics» more  FGR 2000»
15 years 8 months ago
A Virtual 3D Blackboard: 3D Finger Tracking Using a Single Camera
We present a method for tracking the 3D position of a nger, using a single camera placed several meters away from the user. After skin detection, we use motion to identify the ges...
Andrew Wu, Mubarak Shah, Niels da Vitoria Lobo
IPPS
1999
IEEE
15 years 8 months ago
An Approach for Measuring IP Security Performance in a Distributed Environment
Abstract. The Navy needs to use Multi Level Security (MLS) techniques in an environment with increasing amount of real time computation brought about by increased automation requir...
Brett L. Chappell, David T. Marlow, Philip M. Irey...
FMCAD
2007
Springer
15 years 8 months ago
Transaction Based Modeling and Verification of Hardware Protocols
Modeling hardware through atomic guard/action transitions with interleaving semantics is popular, owing to the conceptual clarity of modeling and verifying the high level behavior ...
Xiaofang Chen, Steven M. German, Ganesh Gopalakris...
ECSCW
2007
15 years 5 months ago
Asymmetrical collaboration in print shop-customer relationships
The service provider-customer relationship, although not perhaps considered a typical collaborative relationship, is clearly collaborative work. However, such work is constrained b...
Jacki O'Neill, David Martin, Tommaso Colombino, Je...