Sciweavers

20066 search results - page 3990 / 4014
» T Spaces
Sort
View
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
14 years 1 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
PERCOM
2011
ACM
14 years 1 months ago
PoX: Protecting users from malicious Facebook applications
Abstract—Online social networks such as Facebook, MySpace, and Orkut store large amounts of sensitive user data. While a user can legitimately assume that a social network provid...
Manuel Egele, Andreas Moser, Christopher Kruegel, ...
VR
2011
IEEE
171views Virtual Reality» more  VR 2011»
14 years 1 months ago
Leveraging change blindness for redirection in virtual environments
We present change blindness redirection, a novel technique for allowing the user to walk through an immersive virtual environment that is considerably larger than the available ph...
Evan A. Suma, Seth Clark, David M. Krum, Samantha ...
VR
2011
IEEE
309views Virtual Reality» more  VR 2011»
14 years 1 months ago
Two-handed tangible interaction techniques for composing augmented blocks
Abstract Modeling tools typically have their own interaction methods for combining virtual objects. For realistic composition in 3D space, many researchers from the fields of virt...
Hyeongmook Lee, Mark Billinghurst, Woontack Woo
ICCV
2011
IEEE
14 years 1 months ago
Outdoor Human Motion Capture using Inverse Kinematics and von Mises-Fisher Sampling
Human motion capturing (HMC) from multiview image sequences constitutes an extremely difficult problem due to depth and orientation ambiguities and the high dimensionality of the s...
Gerard Pons-Moll, Andreas Baak, Juergen Gall, Laur...
« Prev « First page 3990 / 4014 Last » Next »