Sciweavers

2450 search results - page 391 / 490
» Exploring Unknown Environments
Sort
View
130
Voted
ICAS
2008
IEEE
227views Robotics» more  ICAS 2008»
15 years 10 months ago
The 4C Reference Model for Distributed User Interfaces
Distributed User Interfaces (DUIs) are those interfaces whose different parts can be distributed in time and space on different monitors, screens, and computing platforms, dependi...
Alexandre Demeure, Jean-Sebastien Sottet, Gaë...
130
Voted
IROS
2008
IEEE
144views Robotics» more  IROS 2008»
15 years 10 months ago
Task maps in humanoid robot manipulation
— This paper presents an integrative approach to solve the coupled problem of reaching and grasping an object in a cluttered environment with a humanoid robot. While finding an ...
Michael Gienger, Marc Toussaint, Christian Goerick
138
Voted
IV
2008
IEEE
136views Visualization» more  IV 2008»
15 years 10 months ago
Visual Presentation Challenges for Mobile Spatial Applications: Three Case Studies
Using mobile devices for exploring and interacting with the user’s physical environment is among the most promising candidates for commercially successful future telecommunicati...
Peter Fröhlich, Matthias Baldauf, Peter Reich...
136
Voted
IV
2008
IEEE
140views Visualization» more  IV 2008»
15 years 10 months ago
Creating Local Geographies for Map-Based Cyber Navigation
Although Internet and WWW phenomena are often described using spatial metaphors, the commonest means of geographic orientation - the map - is little used in online navigation. Map...
Sabine Cikic, Sabina Jeschke, Fritz Lehmann-Grube
116
Voted
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
15 years 10 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...