Sciweavers

1998 search results - page 183 / 400
» Situated Control Rules
Sort
View
150
Voted
CVGIP
2006
106views more  CVGIP 2006»
15 years 5 months ago
Precomputing avatar behavior from human motion data
Creating controllable, responsive avatars is an important problem in computer games and virtual environments. Recently, large collections of motion capture data have been exploite...
Jehee Lee, Kang Hoon Lee
ARESEC
2011
119views more  ARESEC 2011»
14 years 4 months ago
Some Security Issues in SCALANCE Wireless Industrial Networks
—We discuss some security weaknesses of Scalance wireless access points and clients. These devices, developed by Siemens, are commonly used for wireless communication in network ...
Marius Cristea, Bogdan Groza, Mihai Iacob
SIGMOD
2007
ACM
170views Database» more  SIGMOD 2007»
16 years 5 months ago
Cardinality estimation using sample views with quality assurance
Accurate cardinality estimation is critically important to high-quality query optimization. It is well known that conventional cardinality estimation based on histograms or simila...
Per-Åke Larson, Wolfgang Lehner, Jingren Zho...
OZCHI
2006
ACM
15 years 11 months ago
Question-based group authentication
There are various situations where a distinction needs to be made between group members and outsiders. For example, to protect students in chat groups from unpleasant incidents ca...
Ann Nosseir, Richard C. H. Connor, Karen Renaud
129
Voted
FSTTCS
2005
Springer
15 years 10 months ago
Semiperfect-Information Games
Much recent research has focused on the applications of games with ω-regular objectives in the control and verification of reactive systems. However, many of the game-based model...
Krishnendu Chatterjee, Thomas A. Henzinger