Sciweavers

2399 search results - page 299 / 480
» On Authentication between Human and Computer
Sort
View
ACMACE
2005
ACM
15 years 10 months ago
Integrate and conquer: the next generation of intelligent avatars
FreeWill+ is a framework that aims at integrating various animation techniques for controlling human-like characters. With heterogeneity and multi-layering as its main design prin...
Jaroslaw Francik, Adam Szarowicz
ACMACE
2005
ACM
15 years 10 months ago
SCORPIODROME: an exploration in mixed reality social gaming for children
This paper describes the design of SCORPIODROME a mixed reality game for groups of 3-4 children aged 11-14. SCORPIODROME is designed for social gaming; i.e., computer gaming that ...
Georgios Metaxas, Barbaros Metin, Jutta Schneider,...
125
Voted
CASSIS
2005
Springer
15 years 10 months ago
Romization: Early Deployment and Customization of Java Systems for Constrained Devices
Memory is one of the scarcest resource of embedded and constrained devices. This paper studies the memory footprint benefit of pre-deploying embedded Java systems up to their acti...
Alexandre Courbot, Gilles Grimaud, Jean-Jacques Va...
MHCI
2005
Springer
15 years 10 months ago
Searching common experience: a social communication tool based on mobile ad-hoc networking
As small digital cameras become more popular, opportunities to take photos are rapidly increasing. Photo sharing is a great way to maintain and revitalize relationships between fa...
Michimune Kohno, Jun Rekimoto
NORDICHI
2004
ACM
15 years 10 months ago
Visual attention tracking during program debugging
This paper reports on a study which compared two tools for tracking the focus of visual attention - a remote eye tracker and the Restricted Focus Viewer (RFV). The RFV tool blurs ...
Roman Bednarik, Markku Tukiainen