Sciweavers

469 search results - page 32 / 94
» On Cipher Design Based on Switchable Controlled Operations
Sort
View
KES
2004
Springer
15 years 5 months ago
comDesk: A Cooperative Assistance Tool Based on P2P Techniques
We have designed and implemented a desktop sharing system based on P2P (peer-to-peer) techniques, named “comDesk,” which enables users to exchange the desktop images as well as...
Motoki Miura, Buntarou Shizuki, Jiro Tanaka
CGA
2005
14 years 11 months ago
Bounded Blending for Function-Based Shape Modeling
We propose new analytical formulations of bounded blending operations for the function-based constructive shape modeling. The blending set operations are defined using R-functions...
Galina Pasko, Alexander A. Pasko, Tosiyasu L. Kuni...
SACMAT
2004
ACM
15 years 5 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
ENGL
2007
88views more  ENGL 2007»
14 years 11 months ago
Computer Simulated Tests for Lever Controls with Circular Displays
— Using computer simulated tests, this study examined direction-of-motion stereotypes and response times for different configurations of lever controls and circular displays. Qua...
W. H. Chan, Alan H. S. Chan
ICRA
1998
IEEE
84views Robotics» more  ICRA 1998»
15 years 4 months ago
SCOUT: A Simple Quadruped that Walks, Climbs and Runs
A simple mechanical design for quadrupedal locomotion, termed SCOUT, is proposed, featuring only one degree of freedom per leg. This paper demonstrates experimentally that our rst...
Martin Buehler, R. Battaglia, A. Cocosco, Geoff Ha...