Sciweavers

561 search results - page 39 / 113
» How to operate a PC without using the hands
Sort
View
HAPTICS
2008
IEEE
15 years 1 months ago
Effects of Varied Human Movement Control on Task Performance and Feeling of Telepresence
In a telemanipulation system a human operator controls a remotely located teleoperator by a human system interface. In this work the effects of varied human movement control on tas...
Helena Pongrac, Angelika Peer, Berthold Färbe...
TEI
2012
ACM
225views Hardware» more  TEI 2012»
13 years 9 months ago
On-body interaction: armed and dangerous
Recent technological advances in input sensing, as well as ultra-small projectors, have opened up new opportunities for interaction – the use of the body itself as both an input...
Chris Harrison, Shilpa Ramamurthy, Scott E. Hudson
DATESO
2007
107views Database» more  DATESO 2007»
15 years 2 months ago
Updating Typed XML Documents Using a Functional Data Model
We address a problem of updating XML documents having their XML schema described by a Document Type Definition (DTD) without breaking their validity. We present a way how to expre...
Pavel Loupal
ACMICEC
2006
ACM
213views ECommerce» more  ACMICEC 2006»
15 years 7 months ago
CMieux: adaptive strategies for competitive supply chain trading
Supply chains are a central element of today’s global economy. Existing management practices consist primarily of static interactions between established partners. Global compet...
Michael Benisch, Alberto Sardinha, James Andrews, ...
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
15 years 5 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena