Sciweavers

335 search results - page 41 / 67
» Bergson's Virtual Action
Sort
View
EUROSYS
2008
ACM
15 years 6 months ago
Protectit: trusted distributed services operating on sensitive data
Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted d...
Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ah...
ICCV
2007
IEEE
15 years 11 months ago
Interacting with Projected Media on Deformable Surfaces
This paper presents a novel human-computer interface for projector/camera-based applications that uses a deformable interaction surface. We discuss its design and implementation w...
Siska Fitriani, Wooi-Boon Goh
ACMSE
2004
ACM
15 years 3 months ago
A P2P intrusion detection system based on mobile agents
Traditional intrusion detection systems have a central coordinator with a static hierarchical architecture. We propose a peer-to-peer intrusion detection system that has no centra...
Geetha Ramachandran, Delbert Hart
ISER
1997
Springer
91views Robotics» more  ISER 1997»
15 years 1 months ago
Extracting Robotic Part-mating Programs from Operator Interaction with a Simulated Environment
We describe an integrated system for programming part-mating and contact tasks using simulation. A principal goal of this work is to make robotic programming easy and intuitive fo...
John E. Lloyd, Dinesh K. Pai
VRCAI
2006
ACM
15 years 3 months ago
ICWall: a calibrated stereo tiled display from commodity components
Recent developments in the fields of parallel rendering and high resolution tiled displays have made it possible to apply these technologies to build large and scalable stereo di...
Tom van der Schaaf, Desmond Germans, Michal Koutek...