Sciweavers

4810 search results - page 921 / 962
» Modeling Value Speculation
Sort
View
DIGRA
2005
Springer
15 years 3 months ago
Beyond P-1: Who Plays Online?
Academics and industry professionals alike have long been interested in developing a nuanced and empirically sound typography of online gamers. Designers and engineers are aware o...
Avery Alix
ECOOP
2005
Springer
15 years 3 months ago
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
In Java 2 and Microsoft .NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted ...
Marco Pistoia, Robert J. Flynn, Larry Koved, Vugra...
NIME
2005
Springer
134views Music» more  NIME 2005»
15 years 3 months ago
Haptic Music Exercises
Pluck, ring, rub, bang, strike, and squeeze are all simple gestures used in controlling music. A single motor/encoder plus a force-sensor has proved to be a useful platform for ex...
William Verplank
JCDL
2004
ACM
146views Education» more  JCDL 2004»
15 years 3 months ago
Enhancing digital libraries with TechLens+
The number of research papers available is growing at a staggering rate. Researchers need tools to help them find the papers they should read among all the papers published each y...
Roberto Torres, Sean M. McNee, Mara Abel, Joseph A...
MMSEC
2004
ACM
137views Multimedia» more  MMSEC 2004»
15 years 3 months ago
Perturbed quantization steganography with wet paper codes
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal