Sciweavers

54 search results - page 6 / 11
» Human-computer protocols
Sort
View
85
Voted
HUC
2009
Springer
15 years 2 months ago
Authenticating ubiquitous services: a study of wireless hotspot access
: © Authenticating Ubiquitous Services: A Study of Wireless Hotspot Access Tim Kindberg, Chris Bevan, Eamonn O'Neill, James Mitchell, Jim Grimmett, Dawn Woodgate HP Laborator...
Tim Kindberg, Chris Bevan, Eamonn O'Neill, James M...
HCI
2009
14 years 7 months ago
Considerations for Designing Response Quantification Procedures in Non-traditional Psychophysiological Applications
Abstract. Psychophysiological assessment in the context of virtual environments is a promising means for benchmarking the efficacy and ecological validity of virtual reality scenar...
A. V. Iyer, L. D. Cosand, Christopher G. Courtney,...
81
Voted
HRI
2012
ACM
13 years 5 months ago
ROS and Rosbridge: roboticists out of the loop
The advent of ROS, the Robot Operating System, has finally made it possible to implement and use state-of-the-art navigation and manipulation algorithms on widely-available, inex...
Christopher Crick, Graylin Jay, Sarah Osentoski, O...
98
Voted
HAPTICS
2010
IEEE
14 years 7 months ago
The Influence of Different Haptic Environments on Time Delay Discrimination in Force Feedback
Time delay in haptic telepresence arising from compression or communication alters the phase characteristics of the environment impedance. This paper describes how well a human ope...
Markus Rank, Zhuanghua Shi, Hermann J. Müller...
91
Voted
ACMACE
2006
ACM
15 years 3 months ago
An empirical evaluation of TCP performance in online games
A fundamental design question to ask in the development of a network game is—Which transport protocol should be used—TCP, UDP, or some other protocols? Seeking an objective an...
Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, Chin-L...