Sciweavers

1316 search results - page 240 / 264
» The Jam-O-Drum Interactive Music System: A Study in Interact...
Sort
View
P2P
2007
IEEE
165views Communications» more  P2P 2007»
15 years 3 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
VR
2007
IEEE
151views Virtual Reality» more  VR 2007»
15 years 3 months ago
The Influence of Visual Appearance of User's Avatar on the Manipulation of Objects in Virtual Environments
This paper describes an experiment conducted to study the influence of visual appearance of user’s avatar (or 3D cursor) on the manipulation of virtual objects in Virtual Enviro...
Abdelmajid Kadri, Anatole Lécuyer, Jean-Mar...
81
Voted
HICSS
2006
IEEE
119views Biometrics» more  HICSS 2006»
15 years 3 months ago
Increasing Relevance of Smoking Cessation Messages in an Online Software Agent Environment
An online software agent that helps smokers quit was designed and tested. We created a library of categorized smoking cessation messages using meta-data corresponding to the Stage...
Todd Shimoda, Linda Stapel
ISCC
2005
IEEE
116views Communications» more  ISCC 2005»
15 years 3 months ago
Link Buffer Sizing: A New Look at the Old Problem
We revisit the question of how much buffer an IP router should allocate for its Droptail FIFO link. For a long time, setting the buffer size to the bitrate-delay product has been ...
Sergey Gorinsky, Anshul Kantawala, Jonathan S. Tur...
84
Voted
ATAL
2005
Springer
15 years 3 months ago
Catch me if you can: exploring lying agents in social settings
Embodied conversational agents become more and more realistic concerning their conversational and their nonverbal behaviors. But if the information conveyed nonverbally exhibits c...
Matthias Rehm, Elisabeth André