In this paper we present results from a detailed measurement study of TCP (Transmission Control Protocol) running over a wireless link. Our primary goal was on obtaining a breakdo...
We sought to create a social embodied conversational agent to support group interactions, using ‘balance theory’ from social science research on human-human relations. We cond...
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div...
We introduce a computational model of sensor fusion based on the topographic representations of a ”two-microphone and one camera” configuration. Our aim is to perform a robust...
Current graphics hardware can render procedurally shaded objects in real-time. However, due to resource and performance limitations, interactive shaders can not yet approach the c...