Sciweavers

4445 search results - page 217 / 889
» Reflective Authorization Systems
Sort
View
IMAGING
2003
15 years 6 months ago
Reproducing 3D Prints on Monitor by Relative-Glossiness Matching Technique
For over 3 decades, computer graphics technology has been developed to simulate physically accurate image of real scene. Meanwhile, useful tone mapping methods have been developed...
Toru Ishi, Norimichi Tsumura, Masami Shishikura, Y...
PROMISE
2010
14 years 11 months ago
Defect cost flow model: a Bayesian network for predicting defect correction effort
Background. Software defect prediction has been one of the central topics of software engineering. Predicted defect counts have been used mainly to assess software quality and est...
Thomas Schulz, Lukasz Radlinski, Thomas Gorges, Wo...
ISW
2010
Springer
15 years 2 months ago
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Xinyuan Wang, Xuxian Jiang
CHI
2006
ACM
16 years 5 months ago
Listening to your inner voices: investigating means for voice notifications
Our research investigates notification qualities of different types of voices, moving toward interfaces that support optimal allocation of attention to maximize system utility. We...
Saurabh Bhatia, D. Scott McCrickard
ISMAR
2007
IEEE
15 years 11 months ago
Semi-automatic Annotations in Unknown Environments
Unknown environments pose a particular challenge for augmented reality applications because the 3D models required for tracking, rendering and interaction are not available ahead ...
Gerhard Reitmayr, Ethan Eade, Tom Drummond