Sciweavers

562 search results - page 84 / 113
» Distinguishing between cause and effect
Sort
View
CHI
2000
ACM
15 years 2 months ago
Two-handed input using a PDA and a mouse
We performed several experiments using a Personal Digital Assistant (PDA) as an input device in the nondominant hand along with a mouse in the dominant hand. A PDA is a small hand...
Brad A. Myers, Kin Pou Lie, Bo-Chieh Yang
INFOCOM
1999
IEEE
15 years 2 months ago
Performance Analysis on Path Rerouting Algorithms for Handoff Control in Mobile ATM Networks
This paper studies mobile-generated traffic distributions in mobile ATM networks and evaluates the performance of path rerouting algorithms for handoff control. In mobile ATM netwo...
Jun Li, Roy D. Yates, Dipankar Raychaudhuri
SIGGRAPH
1996
ACM
15 years 1 months ago
View Morphing
Image morphing techniques can generate compelling 2D transitions between images. However, differences in object pose or viewpoint often cause unnatural distortions in image morphs...
Steven M. Seitz, Charles R. Dyer
CHES
2006
Springer
152views Cryptology» more  CHES 2006»
15 years 1 months ago
Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style
In recent years, some countermeasures against Differential Power Analysis (DPA) at the logic level have been proposed. At CHES 2005 conference, Popp and Mangard proposed a new coun...
Daisuke Suzuki, Minoru Saeki
ESWS
2008
Springer
14 years 11 months ago
Building a Semantic Web Image Repository for Biological Research Images
Abstract. Images play a vital role in scientific studies. An image repository would become a costly and meaningless data graveyard without descriptive metadata. We adapted EPrints,...
Jun Zhao, Graham Klyne, David M. Shotton