In earlier studies, user involvement with an embodied software agent and willingness to use that agent were partially determined by the aesthetics of the design and the moral fiber...
Matthijs Pontier, Ghazanfar F. Siddiqui, Johan F. ...
e an abstraction of zero-knowledge protocols that is le to a fully mechanized analysis. The abstraction is formalized within the applied pi-calculus using a novel equational theor...
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
—We report a series of experiments conducted to investigate the effects of travel technique on information gathering and cognition in complex virtual environments. In the first e...
Evan A. Suma, Samantha L. Finkelstein, Myra Reid, ...
— in this paper we address the problem of reducing the feedback for the downlink transmission in multi-carrier systems. In these systems multiple Component Carriers (CCs) are agg...
Yuanye Wang, Klaus I. Pedersen, Troels B. Sø...