Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
In this paper we introduce a framework for instrumenting (“rigging”) characters that are modeled as dynamic elastic bodies, so that their shapes can be controlled by an animat...
Steve Capell, Matthew Burkhart, Brian Curless, Tom...
Abstract: The abstract syntax and static semantics of UML, the widely-used generalpurpose graphical modeling language, have been standardized in a four-layer metamodeling framework...
Change in a speaker's emotion is a fundamental component in human communication. Automatic recognition of spontaneous emotion would significantly impact human-computer interac...
Zhihong Zeng, Yun Fu, Glenn I. Roisman, Zhen Wen, ...
Execution-driven simulation has become the primary method for evaluating architectural techniques as it facilitates rapid design space exploration without the cost of building pro...