We present a logical approach to plan recognition that builds on Kautz's theory of keyhole plan recognition, defined as the problem of inferring descriptions of high-level pl...
This paper presents a theory of runtime enforcement based on mechanism models called MRAs (Mandatory Results Automata). MRAs can monitor and transform security-relevant actions and...
The advent of the Internet has made the transmission of personally identifiable information common and often inadvertent to the user. As a consequence, individuals worry that comp...
Il-Horn Hann, Kai Lung Hui, Sang-Yong Tom Lee, Iva...
Giddens' structuration theory (ST) offers an account of social life in terms of social practices developing and changing over time and space, which makes no attempt to direct...
We discuss and reflect on the importance of embodiment, context, and spatial proximity as they pertain to the sense of presence obtained by individuals in virtual environments. We...
Brian E. Mennecke, Janea L. Triplett, Lesya M. Has...