Sciweavers

13224 search results - page 72 / 2645
» Self-monitoring for Computer Users
Sort
View
COMPSAC
2011
IEEE
14 years 1 months ago
Dynamic Request Management Algorithms for Web-Based Services in Cloud Computing
—Providers of Web-based services can take advantage of many convenient features of cloud computing infrastructures, but they still have to implement request management algorithms...
Riccardo Lancellotti, Mauro Andreolini, Claudia Ca...
123
Voted
GROUP
2010
ACM
14 years 11 months ago
The human factors of consistency maintenance in multiplayer computer games
Consistency maintenance (CM) techniques are a crucial part of many distributed systems, and are particularly important in networked games. In this paper we describe a framework of...
Cheryl Savery, T. C. Nicholas Graham, Carl Gutwin
JDCTA
2010
171views more  JDCTA 2010»
14 years 8 months ago
Computer Interaction System using Hand Posture Identification
Natural and friendly interface is critical for the development of service robots. Gesture-based interface offers a way to enable untrained users to interact with robots more easil...
Sushma D. Ghode, S. A. Chhabria, R. V. Dharaskar
HCI
2009
14 years 11 months ago
New Human-Computer Interactions Using Tangible Objects: Application on a Digital Tabletop with RFID Technology
This paper presents a new kind of interaction between users and a tabletop. The table described is interactive and associated with tangible and traceable objects using RFID technol...
Sébastien Kubicki, Sophie Lepreux, Yoann Le...
SP
2002
IEEE
161views Security Privacy» more  SP 2002»
15 years 1 months ago
Improving Computer Security Using Extended Static Checking
We describe a method for finding security flaws in source code by way of static analysis. The method is notable because it allows a user to specify a wide range of security proper...
Brian Chess