Sciweavers

5722 search results - page 465 / 1145
» Security Function Interactions
Sort
View
ERCIMDL
2009
Springer
94views Education» more  ERCIMDL 2009»
15 years 11 months ago
A Visualization Technique for Quality Control of Massive Digitization Programs
Massive digitization programs need massive visualization techniques for quality control. We describe the functional prototype of a 3D interactive environment enabling a rapid inspe...
Rodrigo Andrade de Almeida, Pedro Alessio, Alexand...
FIMH
2007
Springer
15 years 11 months ago
Can We Trust the Transgenic Mouse? Insights from Computer Simulations
Abstract. Over the past several decades, the mouse has gained prominence in the cardiac electrophysiology literature as the animal model of choice. Using computer models of the mou...
Joseph Tranquillo, Adhira Sunkara
ICIP
2008
IEEE
16 years 6 months ago
Modeling spatial patterns of shapes
We introduce a framework for modeling spatial patterns of shapes formed by multiple objects in an image. Our approach is graph-based where each node denotes an object and attribut...
Anuj Srivastava, Wei Liu, Shantanu H. Joshi
CHI
2003
ACM
16 years 5 months ago
Amigo - wireless image based instant messaging for handheld computers
We introduce Amigo ? an Instant Messaging (IM) client for handheld computers. Amigo allows free-form images as well as handwriting to be sent between people, taking advantage of t...
Elisabeth Windt, Helena Fabersjö, Johan Sanne...
117
Voted
CHI
2002
ACM
16 years 5 months ago
Physiological computing
This paper is concerned with how Physiological Computing (PC) and Brain-Computer Interfaces (BCI) may be used to enhance computer games. It is argued that PC offers a greater rang...
Jennifer Allanson, Gillian M. Wilson