Sciweavers

132 search results - page 22 / 27
» Identifying Bullies with a Computer Game
Sort
View
MOBICOM
2012
ACM
13 years 2 months ago
Distinguishing users with capacitive touch communication
As we are surrounded by an ever-larger variety of post-PC devices, the traditional methods for identifying and authenticating users have become cumbersome and time-consuming. In t...
Tam Vu, Akash Baid, Simon Gao, Marco Gruteser, Ric...
CHI
2009
ACM
16 years 7 days ago
In CMC we trust: the role of similarity
This paper examines how different forms of linguistic similarity in a text-chat environment relate to the establishment of interpersonal trust. Sixty-two pairs played an iterative...
Lauren E. Scissors, Alastair J. Gill, Kathleen Ger...
86
Voted
FDG
2009
ACM
15 years 6 months ago
System for Automated Interactive Lighting (SAIL)
Successful lighting in video games is more than a physically accurate illumination model. Aesthetics and function are of equal or greater importance. Lighting designers may deviat...
Joseph A. Zupko, Magy Seif El-Nasr
SCA
2007
15 years 2 months ago
Smooth movers: perceptually guided human motion simulation
To animate a character, a number of poses are displayed in quick succession in order to create the illusion of motion. For most real-time applications, such as games, the pose upd...
Rachel McDonnell, Fiona N. Newell, Carol O'Sulliva...
97
Voted
TON
2002
75views more  TON 2002»
14 years 11 months ago
Optimal retrial and timeout strategies for accessing network resources
The notion of timeout (namely, the maximal time to wait before retrying an action) turns up in many networking contexts, such as packet transmission, connection establishment, etc....
Lavy Libman, Ariel Orda