- published: 05 Feb 2013
- views: 86
- author: YLabs Portugal
2:26

VicTour, Virtual Interactive Character Tour Guide
VicTour is YLabs 's final proof-of-concept resulting from its latest software research pro...
published: 05 Feb 2013
author: YLabs Portugal
VicTour, Virtual Interactive Character Tour Guide
VicTour, Virtual Interactive Character Tour Guide
VicTour is YLabs 's final proof-of-concept resulting from its latest software research project CHAMELEON. During the development process the project generate...- published: 05 Feb 2013
- views: 86
- author: YLabs Portugal
14:56

Punch Card Programming - Computerphile
How did punch card systems work? Professor Brailsford delves further into the era of mainf...
published: 21 Aug 2013
Punch Card Programming - Computerphile
Punch Card Programming - Computerphile
How did punch card systems work? Professor Brailsford delves further into the era of mainframe computing with this hands-on look at punch cards. Extra Material on Punch Cards: http://youtu.be/lkSGMrH5Kic Extra Material - behind the scenes: http://youtu.be/Wi326Leuemg Mainframes to Unix: http://www.youtube.com/watch?v=-rPPqm44xLs Near to the Metal: http://www.youtube.com/watch?v=uNuFVq5QeRk Addendum: "ICL punched cards actually have 12 rows -- not 11 as stated in the film. Choosing any two hole positions out of 12 gives 66 combinations -- which can represent 66 different characters. This in turn is more than enough for the 64 possibilities of a 6-bit character held in ICL computer memory. Also, some special characters could actually utilise three hole configurations adding further to the possibilities." http://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by Sean Riley. Computer Science at the University of Nottingham: http://bit.ly/nottscomputer Computerphile is a sister project to Brady Haran's Numberphile. See the full list of Brady's video projects at: http://bit.ly/bradychannels- published: 21 Aug 2013
- views: 25030
1:01

Computing Exact Arbitrary Clearance for Navigation Meshes (Fastforward video)
R. Oliva, A. Beacco and N. Pelechano Poster presented at ACM SIGGRAPH Symposium on Compute...
published: 31 Jul 2013
author: Alejandro Beacco Porres
Computing Exact Arbitrary Clearance for Navigation Meshes (Fastforward video)
Computing Exact Arbitrary Clearance for Navigation Meshes (Fastforward video)
R. Oliva, A. Beacco and N. Pelechano Poster presented at ACM SIGGRAPH Symposium on Computer Animation 2013 (SCA 2013), Anaheim, CA, USA, 19th - 21st July 201...- published: 31 Jul 2013
- views: 7
- author: Alejandro Beacco Porres
7:05

Creative Computing 40th Anniversary?
This is the first episode of season 2 of my channel. In it, I take a small break from the ...
published: 20 Nov 2012
author: Shawn Driscoll
Creative Computing 40th Anniversary?
Creative Computing 40th Anniversary?
This is the first episode of season 2 of my channel. In it, I take a small break from the Traveller character generator I'm programming and talk about the co...- published: 20 Nov 2012
- views: 22
- author: Shawn Driscoll
3:34

MAOMI - Multi Autonomous Objects Interaction and Manipulation sandbox
MAOMI - Multi Autonomous Objects Interaction and Manipulation sandbox for Intel Perceptual...
published: 24 Sep 2013
MAOMI - Multi Autonomous Objects Interaction and Manipulation sandbox
MAOMI - Multi Autonomous Objects Interaction and Manipulation sandbox
MAOMI - Multi Autonomous Objects Interaction and Manipulation sandbox for Intel Perceptual Computing Challenge 2013 Maomi demonstrates that the virtual hand controlled by Intel's gesture camera can be an important part of the virtual scene and the gameplay. + fully utilizes the finger and palm position tracking technology and voice recognition technology from PerC SDK. + provides full immersion of the player into the virtual environment. It means that changes in the physical world originate reactions of the object Ai/Animation systems. So the virtual hand controlled by user directly interacts not only with physical world objects but with the autonomous AI driven characters and flying helibots as well. + consists of three type of physical objects: pillars, stones and crates + consists of flying helibots: Every helibot reacts to the user's commands to realize the desired behavior, tries to avoid to obstacles, other helibots and virtual hand, landing on virtual hand, etc... + consists of autonomous characters: Every character reacts to the user's commands to realize the desired behavior, avoids to all obstacles, to all characters and virtual hand + is just unfinished sandbox with a lot of open goals. The biggest challenge is to improve finger tracking technology to stabilize the pose and movement of the virtual hand model. Intel Perceptual Computing Challenge 2013 Music by U.N.K.L.E. - Chemistry. I have no rights, I just like it a lot and it goes well with my video.- published: 24 Sep 2013
- views: 26
5:10

Computational Design of Mechanical Characters
Link to project page & press release: http://www.disneyresearch.com/project/mechanical-cha...
published: 21 Jul 2013
author: DisneyResearchHub
Computational Design of Mechanical Characters
Computational Design of Mechanical Characters
Link to project page & press release: http://www.disneyresearch.com/project/mechanical-characters We developed an interactive design system that allows non-e...- published: 21 Jul 2013
- views: 100882
- author: DisneyResearchHub
6:39

Higher Computing - Computer Systems: Storing Text using ASCII and Unicode
Lesson 3 of Data Representation, looking at ASCII, Unicode and the advantages and disadvan...
published: 15 Nov 2011
author: Mr Mark Hay
Higher Computing - Computer Systems: Storing Text using ASCII and Unicode
Higher Computing - Computer Systems: Storing Text using ASCII and Unicode
Lesson 3 of Data Representation, looking at ASCII, Unicode and the advantages and disadvantages of each.- published: 15 Nov 2011
- views: 301
- author: Mr Mark Hay
34:01

Regular expression - Wiki Article
In computing, a regular expression is a sequence of characters that forms a search pattern...
published: 16 May 2013
author: wikispeak10
Regular expression - Wiki Article
Regular expression - Wiki Article
In computing, a regular expression is a sequence of characters that forms a search pattern, mainly for use in pattern matching with strings. The concept aros...- published: 16 May 2013
- views: 18
- author: wikispeak10
0:04

Big Step,Turn Around. 3D Character Development Class.
DePaul University,College of Computing and Digital Media, Masters Program. 3D Character De...
published: 03 Sep 2013
Big Step,Turn Around. 3D Character Development Class.
Big Step,Turn Around. 3D Character Development Class.
DePaul University,College of Computing and Digital Media, Masters Program. 3D Character Development Class.- published: 03 Sep 2013
- views: 5
9:37

Characters, Symbols and the Unicode Miracle - Computerphile
Audible free book: http://www.audible.com/computerphile
Representing symbols, characters a...
published: 20 Sep 2013
Characters, Symbols and the Unicode Miracle - Computerphile
Characters, Symbols and the Unicode Miracle - Computerphile
Audible free book: http://www.audible.com/computerphile Representing symbols, characters and letters that are used worldwide is no mean feat, but unicode managed it - how? Tom Scott explains how the web has settled on a standard. More from Tom Scott: http://www.youtube.com/user/enyay and https://twitter.com/tomscott EXTRA BITS: http://youtu.be/qBex3IDaUbU Data Security: http://youtu.be/4SSSMi4X_mA http://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by Sean Riley. Computerphile is a sister project to Brady Haran's Numberphile. See the full list of Brady's video projects at: http://bit.ly/bradychannels- published: 20 Sep 2013
- views: 11055
9:46

FINCBS - FinCloud - Cloud Computing Portal
FinCloud is a fully integrated, real time, multi currency cloud computing solution that he...
published: 02 Jun 2012
author: Sanket Nagwekar
FINCBS - FinCloud - Cloud Computing Portal
FINCBS - FinCloud - Cloud Computing Portal
FinCloud is a fully integrated, real time, multi currency cloud computing solution that helps different sectors receive payments for services provided. What ...- published: 02 Jun 2012
- views: 73
- author: Sanket Nagwekar
1:29

RBS ESSA 2013 Bronze Finalist - Loughborough University LSU Computer Society
Loughborough University LSU Computer Society are competing in the RBS ESSA Bronze Final to...
published: 20 Jun 2013
author: RBS ESSA
RBS ESSA 2013 Bronze Finalist - Loughborough University LSU Computer Society
RBS ESSA 2013 Bronze Finalist - Loughborough University LSU Computer Society
Loughborough University LSU Computer Society are competing in the RBS ESSA Bronze Final to win the top prize of £5000. In order to win they need to gain mor...- published: 20 Jun 2013
- views: 22561
- author: RBS ESSA
2:04

EdX - CS50x - Intro to Computing - Final Project
Hey guys! This is my final project for the online Computer Science class at EdX - CS50x. I...
published: 16 Apr 2013
author: Sangeeta Jadoonanan
EdX - CS50x - Intro to Computing - Final Project
EdX - CS50x - Intro to Computing - Final Project
Hey guys! This is my final project for the online Computer Science class at EdX - CS50x. I wrote a small program to randomly generate a medieval character pr...- published: 16 Apr 2013
- views: 55
- author: Sangeeta Jadoonanan
Youtube results:
5:31

Storytelling with Pervasive Computing (C-Touch NFC)
Introduction to some interesting tech that we've been playing with...
Anyone Conducttr pr...
published: 20 Oct 2013
Storytelling with Pervasive Computing (C-Touch NFC)
Storytelling with Pervasive Computing (C-Touch NFC)
Introduction to some interesting tech that we've been playing with... Anyone Conducttr project can use the C-Touch NFC app to trigger their project from NFC tags. The tag must identify the character and matchphrase and the app will send the player's mobile number so that the experience can be personalized. We also show an SMS-enabled power socket and the Twine. NFC tags http://www.amazon.co.uk/RapidNFC-NFC-Tags-Pack-Stickers/dp/B008H26Y7Q/ref=sr_1_4?s=electronics&ie;=UTF8&qid;=1382287318&sr;=1-4&keywords;=nfc+tags GSM power socket http://www.amazon.co.uk/gp/product/B007R1HNTG/ref=oh_details_o02_s00_i00?ie=UTF8&psc;=1 Twine http://supermechanical.com/- published: 20 Oct 2013
- views: 33
0:32

Brain Computing is getting to be real soon
Was at Cebit 2010 Hannover today and saw this at the futur parc. In the Video the demonstr...
published: 03 Mar 2010
author: Suresh Chande
Brain Computing is getting to be real soon
Brain Computing is getting to be real soon
Was at Cebit 2010 Hannover today and saw this at the futur parc. In the Video the demonstrator shows that he is thinking about a character and how the system...- published: 03 Mar 2010
- views: 318
- author: Suresh Chande
1:11

CINS 102 Data Representation - ASCII
Very brief demonstration of how textual data is represented inside the computer. Every cha...
published: 13 Jun 2012
author: Barry Sullens
CINS 102 Data Representation - ASCII
CINS 102 Data Representation - ASCII
Very brief demonstration of how textual data is represented inside the computer. Every character has an ASCII value. We think of those values as decimal numb...- published: 13 Jun 2012
- views: 232
- author: Barry Sullens
13:39

Mona Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud 2013 IEEE DOTNET
To get this project in ONLINE or through TRAINING Sessions, Contact: JP INFOTECH, 45, KAMA...
published: 13 Sep 2013
Mona Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud 2013 IEEE DOTNET
Mona Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud 2013 IEEE DOTNET
To get this project in ONLINE or through TRAINING Sessions, Contact: JP INFOTECH, 45, KAMARAJ SALAI, THATTANCHAVADY, PUDUCHERRY-9 Landmark: Opposite to Thattanchavady Industrial Estate, Next to VVP Nagar Arch. Mobile: (0) 9952649690 , Email: jpinfotechprojects@gmail.com, web: www.jpinfotech.org Blog: www.jpinfotech.blogspot.com Mona Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud 2013 IEEE DOTNET With the character of low maintenance, cloud computing provides an economical and efficient solution for sharing group resource among cloud users. Unfortunately, sharing data in a multi-owner manner while preserving data and identity privacy from an untrusted cloud is still a challenging issue, due to the frequent change of the membership. In this paper, we propose a secure multiowner data sharing scheme, named Mona, for dynamic groups in the cloud. By leveraging group signature and dynamic broadcast encryption techniques, any cloud user can anonymously share data with others. Meanwhile, the storage overhead and encryption computation cost of our scheme are independent with the number of revoked users. In addition, we analyze the security of our scheme with rigorous proofs, and demonstrate the efficiency of our scheme in experiments.- published: 13 Sep 2013
- views: 7