Sciweavers

1270 search results - page 188 / 254
» IF Validation Environment Tutorial
Sort
View
121
Voted
MOBILITY
2009
ACM
15 years 7 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
ICIDS
2009
Springer
15 years 7 months ago
Comparing Effects of Different Cinematic Visualization Strategies on Viewer Comprehension
Abstract. Computational storytelling systems have mainly focused on the construction and evaluation of textual discourse for communicating stories. Few intelligent camera systems h...
Arnav Jhala, R. Michael Young
LCPC
2009
Springer
15 years 7 months ago
A Communication Framework for Fault-Tolerant Parallel Execution
PC grids represent massive computation capacity at a low cost, but are challenging to employ for parallel computing because of variable and unpredictable performance and availabili...
Nagarajan Kanna, Jaspal Subhlok, Edgar Gabriel, Es...
134
Voted
ROBOCUP
2009
Springer
289views Robotics» more  ROBOCUP 2009»
15 years 6 months ago
Real-Time Hand Gesture Recognition for Human Robot Interaction
In this article a hand gesture recognition system that allows interacting with a service robot, in dynamic environments and in real-time, is proposed. The system detects hands and ...
Mauricio Correa, Javier Ruiz-del-Solar, Rodrigo Ve...
130
Voted
MMMACNS
2001
Springer
15 years 6 months ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato