Sciweavers

1489 search results - page 216 / 298
» The First Bug Report
Sort
View
156
Voted
IVA
2010
Springer
15 years 3 months ago
Speed Dating with an Affective Virtual Agent - Developing a Testbed for Emotion Models
In earlier studies, user involvement with an embodied software agent and willingness to use that agent were partially determined by the aesthetics of the design and the moral fiber...
Matthijs Pontier, Ghazanfar F. Siddiqui, Johan F. ...
SP
2008
IEEE
132views Security Privacy» more  SP 2008»
15 years 3 months ago
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
e an abstraction of zero-knowledge protocols that is le to a fully mechanized analysis. The abstraction is formalized within the applied pi-calculus using a novel equational theor...
Michael Backes, Matteo Maffei, Dominique Unruh
SACMAT
2010
ACM
15 years 3 months ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino
140
Voted
TVCG
2010
176views more  TVCG 2010»
15 years 3 months ago
Evaluation of the Cognitive Effects of Travel Technique in Complex Real and Virtual Environments
—We report a series of experiments conducted to investigate the effects of travel technique on information gathering and cognition in complex virtual environments. In the first e...
Evan A. Suma, Samantha L. Finkelstein, Myra Reid, ...
123
Voted
VTC
2010
IEEE
116views Communications» more  VTC 2010»
15 years 3 months ago
Downlink Transmission in Multi-Carrier Systems with Reduced Feedback
— in this paper we address the problem of reducing the feedback for the downlink transmission in multi-carrier systems. In these systems multiple Component Carriers (CCs) are agg...
Yuanye Wang, Klaus I. Pedersen, Troels B. Sø...