Sciweavers

ESORICS
2011
Springer
12 years 4 months ago
Investigation of Signal and Message Manipulations on the Wireless Channel
We explore the suitability of Dolev-Yao-based attacker models for the security analysis of wireless communication. The Dolev-Yao model is commonly used for wireline and wireless ne...
Christina Pöpper, Nils Ole Tippenhauer, Boris...
INTERACT
2003
13 years 6 months ago
Intelligent Manipulation Techniques for Conceptual 3D Design
: One of the main operations in conceptual 3D design is the rearrangement of single and composite objects. This paper presents a new conceptual 3D design system that affords easy m...
Ji-Young Oh, Wolfgang Stürzlinger
GRAPHICSINTERFACE
2001
13 years 6 months ago
3D Scene Manipulation with 2D Devices and Constraints
Content creation for computer graphics applications is a laborious process that requires skilled personnel. One fundamental problem is that manipulation of 3D objects with 2D user...
Graham Smith, Wolfgang Stürzlinger, Tim Salzm...
CHI
2002
ACM
14 years 5 months ago
Comparing voodoo dolls and HOMER: exploring the importance of feedback in virtual environments
When creating techniques for manipulating objects at a distance in immersive virtual environments, researchers have primarily focused on increasing selection range, placement rang...
Jeffrey S. Pierce, Randy F. Pausch