Sciweavers

7778 search results - page 303 / 1556
» Designing Controllers for Reachability
Sort
View
CHI
2005
ACM
16 years 5 months ago
Toward subtle intimate interfaces for mobile devices using an EMG controller
Using a mobile device in a social context should not cause embarrassment and disruption to the immediate environment. Interaction with mobile and wearable devices needs to be subt...
Enrico Costanza, Samuel A. Inverso, Rebecca Allen
ICFP
2005
ACM
16 years 4 months ago
The anatomy of a loop: a story of scope and control
Writing loops with tail-recursive function calls is the equivalent of writing them with goto's. Given that loop packages for Lisp-family languages have been around for over 2...
Olin Shivers
ICC
2007
IEEE
107views Communications» more  ICC 2007»
15 years 11 months ago
The SILO Architecture for Services Integration, controL, and Optimization for the Future Internet
— We propose a new internetworking architecture that represents a departure from current philosophy and practice, as a contribution to the ongoing debate regarding the future Int...
Rudra Dutta, George N. Rouskas, Ilia Baldine, Arno...
ICDIM
2007
IEEE
15 years 11 months ago
Control validation of D.E.S systems: Application to remote laboratories
Objectives of Automation courses are knowledge and know-how transfer to students. It is important for learner to control locally or remotely real systems composed of many sensors ...
Pascale Marange, François Gellot, Bernard R...
DRM
2005
Springer
15 years 10 months ago
Control flow based obfuscation
A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P)...
Jun Ge, Soma Chaudhuri, Akhilesh Tyagi