Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Animation short (1)
- Api (1)
- Automated Recomendations (1)
- CADRC (1)
- CalTrans (1)
-
- California Highway Patrol (1)
- Computer-Aided Dispatch (1)
- Dynamic paint (1)
- Fluid simulation (1)
- Ios (1)
- MEL (1)
- Maya (1)
- Maya plugin (1)
- Mobile (1)
- Productivity (1)
- Qr (1)
- RFID HID iClass Memory Bug Exploit Security (1)
- Recommendation (1)
- Server Hosting (1)
- Task management (1)
- To do list (1)
- Todo (1)
- Training Simulator (1)
- Virtual Machine (1)
- Webapp (1)
Articles 1 - 7 of 7
Full-Text Articles in Computer Engineering
Testing Virtual Machines For Cadrc Server Hosting, Robin Verweij
Testing Virtual Machines For Cadrc Server Hosting, Robin Verweij
Computer Science and Software Engineering
No abstract provided.
Tascked: The Sanity Promoting Task Manager, Jake Tobin
Tascked: The Sanity Promoting Task Manager, Jake Tobin
Computer Science and Software Engineering
Personal task managers or various forms of to-do lists are abundant in our modern computing age. With the explosion of mobile computing technology, it is easier than ever to take notes digitally and make the data seemingly instantly available anywhere on the Internet. There is a fairly well defined core set of features in personal task managers available for public consumption, but it seems nothing that is publicly available provides feedback to the user or suggestions based on user history. Tascked is a task management solution, which records user history and solicits user feedback on progress. This allows the system …
More Like This, Geoffrey Lawson
More Like This, Geoffrey Lawson
Computer Science and Software Engineering
No abstract provided.
Hid Rw300/Rw400 Hardware Implementation Vulnerabilities And Mitigation Strategies, Taylor Nelson
Hid Rw300/Rw400 Hardware Implementation Vulnerabilities And Mitigation Strategies, Taylor Nelson
Computer Science and Software Engineering
The HID RW300/RW400 readers are in use and deployed in buildings around the world. Designed for industrial/commercial facilities security requirements you can find them outside biotech companies (AMGEN), educational institutions (Cal Poly San Luis Obispo), and doctors offices. In a 2010 paper entitled “Heart of Darkness - exploring the uncharted backwaters of HID iCLASSTM security” by Milosch Meriac numerous vulnerabilities were outlined. Despite this research HID continues to sell these readers to consumers.
To properly protect the safety of individuals and assets these HID devices are no longer adequate. I have verified that these attacks are feasible by a moderately …
Dynamic Paint For Maya: Creation And Use In The Animation Short "Color Clash", Christopher Wallis
Dynamic Paint For Maya: Creation And Use In The Animation Short "Color Clash", Christopher Wallis
Computer Science and Software Engineering
This write-up describes the creation and utilization of a paint effect from both the perspective of the programmer and the animator. The paint effect simulates a 2D fluid using the algorithm described in Jos Stam's ``Real-time Fluid Dynamics for Games'' \cite{stam}, bakes the results into an image sequence, and then wraps the sequence around a 3D mesh. The second half of this paper describes how the effect was integrated into the animation short, ``Color Clash'' and the animation pipeline that was used.
Ticketcloud, Ross Mckelvie
Ticketcloud, Ross Mckelvie
Computer Science and Software Engineering
TicketCloud is a digital ticket service that offers advantages to both event hosts/vendors and consumers. Using QR Codes, RESTful cloud APIs, and mobile devices TicketCloud takes an outdated market digital and opens up new methods of transacting, allowing customers to resell tickets from their couch and for vendors to reap the benefits of these transactions.
Tmc Simulator, Stuart Heater
Tmc Simulator, Stuart Heater
Computer Science and Software Engineering
The goal of this project was to design and implement a graphical user interface which simulates TriTech's VisiCad Inform computer- aided dispatch well enough for trainees to learn how to efficiently and accurately use the software in a risk-free environment. The simulator should also allow the training proctor to actively create new incidents during training in order to ensure that the trainees are able to respond properly. The structure of this project allowed me to work with both more- and less-experienced programmers, particularly those who are far more experienced with networking and hardware than myself. It was my first time …