نتایج جستجو برای: input multi

تعداد نتایج: 665837  

Journal: :Presence 2014
Benoit Bossavit Asier Marzo Pérez Oscar Ardaiz-Villanueva Luis Díaz de Cerio Alfredo Pina

Manipulation is one of the most important tasks required in virtual environments and thus it has been thoroughly studied for widespread input devices such as mice or multi-touch screens. Nowadays, the Kinect sensor has turned mid-air interaction into another affordable and popular way of interacting. Mid-air interaction enables the possibility of interacting remotely without any physical contac...

2009
Guido Boella Gabriella Pigozzi Leon van der Torre

Normative systems in a multiagent system must be able to evolve over time, for example due to actions creating or removing norms in the system. The only formal framework to evaluate and classify normative system change methods is the so-called AGM framework of theory change, which has originally been developed as a framework to describe and classify both belief and normative system change. Howe...

2003
Stephen G. Kobourov Christian S. Collberg Steven Kobes Ben Smith S. Trush Gary V. Yee

The DiamondTouch table is a touch-sensitive input device that allows several users to interact with a program at the same time and do so using their hands. We describe our exploration of the capabilities and limitations of the DiamondTouch by focusing on TetraTetris, one of the first nontrivial applications written specifically for the DiamondTouch hardware. TetraTetris is a multi-player game, ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده علوم انسانی 1390

this study attempted to explore if teaching english collocations through two different modes of awareness-raising and input flooding has any possible differential effect on immediate retention as well as retention in a delayed assessment. it also compared the possible differential effect of teaching english collocations implicitly and explicitly on actively using the items in writing. m...

Journal: :IACR Cryptology ePrint Archive 2011
Alexander Rostovtsev Alexey Bogdanov Mikhail Mikhaylov

Method of secure evaluation of polynomial y = F(x1, ..., xk) over some rings on untrusted computer is proposed. Two models of untrusted computer are considered: passive and active. In passive model untrusted computer correctly computes polynomial F and tries to know secret input (x1, ..., xk) and output y. In active model untrusted computer tries to know input and output and tries to change cor...

Journal: :J. Applied Logic 2008
Guido Boella Leon van der Torre

Procedural norms are instrumental norms addressed to agents playing a role in the normative system, for example to motivate these role playing agents to recognize violations or to apply sanctions. Procedural norms have first been discussed in law, where they address legal practitioners such as legislators, lawyers and policemen, but they are discussed now too in normative multiagent systems to ...

Journal: :Computers & Chemical Engineering 2006
Mehrdad Sahebsara Tongwen Chen Sirish L. Shah

This paper studies the parameter estimation of a general multi-input, multi-output multi-rate system in the frequency-domain. Two methods, named dividing to subsystems and input extension, are introduced for dealing with multi-rate systems and the later method is easily used to convert a multi-input, multi-output multi-rate system to several sub-problems with fast input updating and slow output...

Journal: :International Journal of Advanced Computer Science and Applications 2012

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید