Sciweavers

1998 search results - page 228 / 400
» Situated Control Rules
Sort
View
CHI
2005
ACM
16 years 5 months ago
The bubble cursor: enhancing target acquisition by dynamic resizing of the cursor's activation area
We present the bubble cursor ? a new target acquisition technique based on area cursors. The bubble cursor improves upon area cursors by dynamically resizing its activation area d...
Tovi Grossman, Ravin Balakrishnan
HPCA
2008
IEEE
16 years 5 months ago
A comprehensive approach to DRAM power management
This paper describes a comprehensive approach for using the memory controller to improve DRAM energy efficiency and manage DRAM power. We make three contributions: (1) we describe...
Ibrahim Hur, Calvin Lin
IEEEARES
2009
IEEE
16 years 5 days ago
Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones
Near Field Communication (NFC)-enabled mobile phones and services are starting to appear in the field, yet no attempt was made to analyze the security of NFC-enabled mobile phone...
Collin Mulliner
TASE
2009
IEEE
16 years 3 days ago
State Visibility and Communication in Unifying Theories of Programming
We explore the interactions between programvariable state visibility and communication behaviour in state-rich CSP-like processes, using the Unifying Theories of Programming (UTP)...
Andrew Butterfield, Pawel Gancarski, Jim Woodcock
ICRA
2009
IEEE
161views Robotics» more  ICRA 2009»
16 years 18 hour ago
Learning and generalization of motor skills by learning from demonstration
— We provide a general approach for learning robotic motor skills from human demonstration. To represent an observed movement, a non-linear differential equation is learned such ...
Peter Pastor, Heiko Hoffmann, Tamim Asfour, Stefan...