Sciweavers

813 search results - page 112 / 163
» On the interaction between sharing and linearity
Sort
View
SIGGRAPH
2010
ACM
15 years 3 months ago
Volume contact constraints at arbitrary resolution
We introduce a new method for simulating frictional contact between volumetric objects using interpenetration volume constraints. When applied to complex geometries, our formulati...
Jérémie Allard, François Faure, Hadrien Courtec...
USAB
2008
15 years 23 days ago
How Image Based Factors and Human Factors Contribute to Threat Detection Performance in X-Ray Aviation Security Screening
The present study examines the relative importance of a series of known and expected factors that highly affect threat detection performance in aviation security X-ray screening. E...
Anton Bolfing, Tobias Halbherr, Adrian Schwaninger
CHI
2006
ACM
15 years 11 months ago
Being watched or being special: how I learned to stop worrying and love being monitored, surveilled, and assessed
This paper explores the relationship between display of feedback (public vs. private) by a computer system and the basis for evaluation (present vs. absent) of that feedback. We e...
Erica Robles, Abhay Sukumaran, Kathryn Rickertsen,...
CHI
2010
ACM
15 years 4 months ago
MOSES: exploring new ground in media and post-conflict reconciliation
While the history of traditional media in post-conflict peace building efforts is rich and well studied, the potential for interactive new media technologies in this area has gone...
Thomas N. Smyth, John Etherton, Michael L. Best
VTC
2007
IEEE
132views Communications» more  VTC 2007»
15 years 5 months ago
Collaborative Information Revelation and Collusion in "Word-of-Mouth" Access Selection Schemes
— “Word-of-Mouth”, a novel scheme for sharing the service quality experienced with different local networks, is presented and evaluated as a distributed solution for performi...
Pietro Lungaro