Sciweavers

10674 search results - page 1938 / 2135
» The Virtual Environment - Another Approach
Sort
View
ETRA
2008
ACM
139views Biometrics» more  ETRA 2008»
15 years 6 months ago
Limbus/pupil switching for wearable eye tracking under variable lighting conditions
We present a low-cost wearable eye tracker built from off-the-shelf components. Based on the open source openEyes project (the only other similar effort that we are aware of), our...
Wayne J. Ryan, Andrew T. Duchowski, Stanley T. Bir...
EUC
2008
Springer
15 years 6 months ago
Adaptive Buffer Management for Efficient Code Dissemination in Multi-Application Wireless Sensor Networks
Future wireless sensor networks (WSNs) are projected to run multiple applications in the same network infrastructure. While such multi-application WSNs (MA-WSNs) are economically ...
Weijia Li, Yu Du, Youtao Zhang, Bruce Childers, Pi...
196
Voted
EUC
2008
Springer
15 years 6 months ago
An Improved Password-Based Authenticated Key Agreement Scheme for Pervasive Applications
Password authentication is a popular approach used for user authentication in pervasive computing environments due to its simplicity and convenience. To secure the transmission be...
Maw-Jinn Tsaur, Wei-Chi Ku, Hao-Rung Chung
198
Voted
EWCBR
2008
Springer
15 years 6 months ago
Real-Time Plan Adaptation for Case-Based Planning in Real-Time Strategy Games
Abstract. Case-based planning (CBP) is based on reusing past successful plans for solving new problems. CBP is particularly useful in environments where the large amount of time re...
Neha Sugandh, Santiago Ontañón, Ashw...
IE
2007
15 years 6 months ago
An evaluation framework for videogame based tasking of remote vehicles
Unmanned vehicles (UV’s) are increasingly being employed in civil and military domains often for operations in dangerous environments. Typically these vehicles require some leve...
Adam J. Hassell, Philip Smith, David Stratton
« Prev « First page 1938 / 2135 Last » Next »