Modern presentation software is still built around interaction metaphors adapted from traditional slide projectors. We provide an analysis of the problems in this application genr...
Leonhard Lichtschlag, Thorsten Karrer, Jan O. Borc...
Security protocols are small programs designed to ensure properties such as secrecy of messages or authentication of parties in a hostile environment. In this paper we investigate ...
3D models have become an essential element of multimedia applications because they provide visual effects that permit interactive exploration. As in other media types, efficient c...
Abstract. Embedded information assurance applications that are critical to national and international infrastructures, must often adhere to certification regimes that require infor...
Given the pairwise affinity relations associated with a set of data items, the goal of a clustering algorithm is to automatically partition the data into a small number of homogen...