ir increasing use of abstraction, modularity, delayed binding, polymorphism, and source reuse, especially when these attributes are used in combination. Modern processor architectu...
Hemant G. Rotithor, Kevin W. Harris, Mark W. Davis
With the development of inexpensive storage devices, space usage is no longer a bottleneck for computer users. However, the increasingly large amount of personal information poses ...
Data on the file system in mobile internetworked working environments are exposed data to a number of threats ranging from physical theft of storage devices to industrial espiona...
Integrating force feedback with a complete real-time virtual environment system presents problems which are more difficult than those encountered in building simpler forcefeedback...
William R. Mark, Scott C. Randolph, Mark Finch, Ja...
—In this paper, we discuss interaction interoperability in Collaborative Virtual Environments (CVE), intended to mean the ability of two or more users to cooperate despite the he...
Mario Ciampi, Luigi Gallo, Antonio Coronato, Giuse...