Sciweavers

4139 search results - page 694 / 828
» Designing and Implementing Combinator Languages
Sort
View
MM
2005
ACM
108views Multimedia» more  MM 2005»
15 years 4 months ago
uPen: laser-based, personalized, multi-user interaction on large displays
We present the uPen, a laser pointer combined with a contactpushed switch, three press buttons and a wireless communication module. This novel interaction device allows users to i...
Xiaojun Bi, Yuanchun Shi, Xiaojie Chen, Peifeng Xi...
SMA
2005
ACM
104views Solid Modeling» more  SMA 2005»
15 years 4 months ago
Packing a trunk: now with a twist!
In an industry project with a German car manufacturer we are faced with the challenge of placing a maximum number of uniform rigid rectangular boxes in the interior of a car trunk...
Friedrich Eisenbrand, Stefan Funke, Andreas Karren...
EGC
2005
Springer
15 years 4 months ago
Fault Tolerance in the R-GMA Information and Monitoring System
R-GMA (Relational Grid Monitoring Architecture) [1] is a grid monitoring and information system that provides a global view of data distributed across a grid system. R-GMA creates ...
Rob Byrom, Brian A. Coghlan, Andrew W. Cooke, Rone...
93
Voted
MM
2004
ACM
109views Multimedia» more  MM 2004»
15 years 4 months ago
Loss-resilient on-demand media streaming using priority encoding
A novel solution to the reliable multicast problem is the “digital fountain” approach, in which data is encoded with an erasure protection code before transmission, and receiv...
Cheng Huang, Ramaprabhu Janakiraman, Lihao Xu
NSPW
2004
ACM
15 years 4 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman