Sciweavers

6722 search results - page 1092 / 1345
» Reuse-Conducive Development Environments
Sort
View
ISCC
2005
IEEE
15 years 9 months ago
Trie-Based Policy Representations for Network Firewalls
Network firewalls remain the forefront defense for most computer systems. These critical devices filter traffic by comparing arriving packets to a list of rules, or security po...
Errin W. Fulp, Stephen J. Tarsa
123
Voted
ISM
2005
IEEE
112views Multimedia» more  ISM 2005»
15 years 9 months ago
Automatically Generating User Interfaces for Device Federations
One of the ideas of ubiquitous computing is that computing resources should be embedded ubiquitously in the environment, making them available to any nearby users. Some researcher...
Elmar Braun, Max Mühlhäuser
ISM
2005
IEEE
159views Multimedia» more  ISM 2005»
15 years 9 months ago
Avatar-centric Risk Evaluation
Hazard detection and prevention of natural and manmade disasters at critical civil infrastructure is becoming increasingly important. Recent events, such as earthquakes and terror...
Maria-Cruz Villa-Uriol, Falko Kuester, Oscar Garc&...
ISMAR
2005
IEEE
15 years 9 months ago
Evaluation of Mixed-Space Collaboration
Recently Augmented Reality (AR) technology has been used to develop the next generation collaborative interfaces. First results have shown the value of using AR for co-located tas...
Raphael Grasset, Philip Lamb, Mark Billinghurst
ISMAR
2005
IEEE
15 years 9 months ago
Camera-Marker Alignment Framework and Comparison with Hand-Eye Calibration for Augmented Reality Applications
An integral part of every augmented reality system is the calibration between camera and camera-mounted tracking markers. Accuracy and robustness of the AR overlay process is grea...
Gérald Bianchi, Christian Wengert, Matthias...
« Prev « First page 1092 / 1345 Last » Next »