Sciweavers

1050 search results - page 32 / 210
» Two methods of authenticated positioning
Sort
View
90
Voted
ICPR
2004
IEEE
16 years 26 days ago
A Deformable Model Driven Method for Handling Clothes
A model-driven method for handling clothes by two manipulators based on observation with stereo cameras is proposed. The task considered in this paper is to hold up a specific par...
Yasuyo Kita, Fuminori Saito, Nobuyuki Kita
DARE
2000
108views more  DARE 2000»
15 years 1 months ago
Evaluating navigation methods for an AR system
BUILD-IT is a planning tool based on computer vision technology, supporting complex planning and composition tasks. A group of people, seated around a table, interact with objects...
Morten Fjeld
EOR
2010
104views more  EOR 2010»
14 years 9 months ago
New solution methods for single machine bicriteria scheduling problem: Minimization of average flowtime and number of tardy jobs
We consider the bicriteria scheduling problem of minimizing the number of tardy jobs and average flowtime on a single machine. This problem, which is known to be NP-hard, is impor...
Fatih Safa Erenay, Ihsan Sabuncuoglu, Aysegül...
TIFS
2011
252views Education» more  TIFS 2011»
14 years 6 months ago
Secure Device Pairing Based on a Visual Channel: Design and Usability Study
— “Pairing” is the establishment of authenticated key agreement between two devices over a wireless channel. Such devices are ad hoc in nature as they lack any common preshar...
Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N...
IJVR
2007
72views more  IJVR 2007»
14 years 11 months ago
MACBETH: Management of Avatar Conflict by Employment of a Technique Hybrid
—When a virtual environment system prevents a user’s avatar hand from penetrating virtual objects, the seen and felt positions of the hand separate. We propose a new method for...
Eric Burns, Sharif Razzaque, Mary C. Whitton, Fred...