Sciweavers

2821 search results - page 487 / 565
» Tracing a single user
Sort
View
IV
2010
IEEE
170views Visualization» more  IV 2010»
14 years 10 months ago
A Visualization Technique for Access Patterns and Link Structures of Web Sites
There have been two types of Web visualization techniques: visualization of Web sites themselves based on such as link structures or lexical contents, and visualization of browser...
Makiko Kawamoto, Takayuki Itoh
TOG
2008
104views more  TOG 2008»
14 years 10 months ago
A system for high-volume acquisition and matching of fresco fragments: reassembling Theran wall paintings
Although mature technologies exist for acquiring images, geometry, and normals of small objects, they remain cumbersome and time-consuming for non-experts to employ on a large sca...
Benedict J. Brown, Corey Toler-Franklin, Diego Neh...
MANSCI
2010
70views more  MANSCI 2010»
14 years 10 months ago
Trading Higher Software Piracy for Higher Profits: The Case of Phantom Piracy
This paper analytically explores the effect of software bundling on software piracy. We focus on piracy at individual user level where several individuals illegitimately share a s...
Ram D. Gopal, Alok Gupta
SAFECOMP
2010
Springer
14 years 10 months ago
Computational Concerns in the Integration of Unmanned Airborne Systems into Controlled Airspace
Unmanned Airborne Systems (UAS) offer significant benefits for long duration missions. They can also be used in situations where it is inappropriate to expose aircrew to increased ...
Christopher W. Johnson
SPRINGSIM
2010
14 years 10 months ago
Advanced IDE for modeling and simulation of discrete event systems
: Creating models and analyzing simulation results can be a difficult and time-consuming task, especially for non-experienced users. Although several DEVS simulators have been deve...
Matías Bonaventura, Gabriel A. Wainer, Rodr...