Sciweavers

9245 search results - page 1493 / 1849
» Virtualization
Sort
View
NDSS
2003
IEEE
15 years 10 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
SCAM
2003
IEEE
15 years 10 months ago
Design and Implementation of Bytecode-based Java Slicing System
Program slice is a set of statements that affect the value of variable v in a statement s. In order to calculate a program slice, we must know the dependence relations between sta...
Fumiaki Umemori, Kenji Konda, Reishi Yokomori, Kat...
TPCG
2003
IEEE
15 years 10 months ago
Intuitive Crowd Behaviour in Dense Urban Environments using Local Laws
In games, entertainment, medical and architectural applications, the creation of populated virtual city environments has recently become widespread. In this paper we want to provi...
Céline Loscos, David Marchal, Alexandre Mey...
VISUALIZATION
2003
IEEE
15 years 10 months ago
A Constraint-Based Technique for Haptic Volume Exploration
We present a haptic rendering technique that uses directional constraints to facilitate enhanced exploration modes for volumetric datasets. The algorithm restricts user motion in ...
Milan Ikits, J. Dean Brederson, Charles D. Hansen,...
AFRIGRAPH
2003
ACM
15 years 10 months ago
Development of a real time image based object recognition method for mobile AR-devices
In this paper we describe an image based object recognition and tracking method for mobile AR-devices and the correlative process to generate the required data. The object recogni...
Jürgen Gausemeier, Jürgen Fründ, Ca...
« Prev « First page 1493 / 1849 Last » Next »