Adaptively-secure encryption schemes ensure secrecy even in the presence of an adversary who can corrupt parties in an adaptive manner based on public keys, ciphertexts, and secret...
Beginning with the adoption of the de-facto standard for wireless LAN communications IEEE 802.11 in 1999 we can observe a continuous growth of public wireless LAN hotspots that pro...
The problem of classifying complex motor activities from brain imaging is relatively new territory within the fields of neuroscience and brain-computer interfaces. We report posi...
Nishant Mehta, Thad Starner, Melody Moore Jackson,...
This paper describes an authoring language for specifying communicative behavior and interaction of agents in virtual worlds. We focus on the popular three-dimensional (3D) multi-...
Sebastian Ullrich, Helmut Prendinger, Mitsuru Ishi...
Embodied agents or humanoid avatars may effectively be used to communicate with human users. Currently there is a wide range of specification formalisms and scripting languages f...