Sciweavers

7405 search results - page 1354 / 1481
» Computer Graphics
Sort
View
CHI
2009
ACM
15 years 10 months ago
Waterhouse: enabling secure e-mail with social networking
We present Waterhouse, a system for sending and receiving cryptographically protected electronic mail ("secure e-mail"). We show how an existing e-mail interface can be ...
Alex P. Lambert, Stephen M. Bezek, Karrie Karahali...
NETGAMES
2006
ACM
15 years 3 months ago
Meeting technology challenges of pervasive augmented reality games
Pervasive games provide a new type of game combining new technologies with the real environment of the players. While this already poses new challenges to the game developer, requ...
Wolfgang Broll, Jan Ohlenburg, Irma Lindt, Iris He...
ICICS
2005
Springer
15 years 3 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
SIGCSE
2010
ACM
187views Education» more  SIGCSE 2010»
15 years 3 months ago
Game-themed programming assignments for faculty: a case study
Despite the proven success of using computer video games as a context for teaching introductory programming (CS1/2) courses, barriers including the lack of adoptable materials, re...
Cinnamon Hillyard, Robin Angotti, Michael Panitz, ...
VRST
1997
ACM
15 years 2 months ago
Real-time vision-based camera tracking for augmented reality applications
Augmented reality deals with the problem of dynamically augmenting or enhancing (images or live video of) the real world with computer generated data (e.g., graphics of virtual ob...
Dieter Koller, Gudrun Klinker, Eric Rose, David E....
« Prev « First page 1354 / 1481 Last » Next »