Abstract. We describe a method for enumerating all essentially different executions possible for a cryptographic protocol. We call them the shapes of the protocol. Naturally occur...
Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Th...
We motivate an approach to evaluating the utility of lifelike interface agents that is based on human eye movements rather than questionnaires. An eye tracker is employed to obtai...
Helmut Prendinger, Chunling Ma, Jin Yingzi, Arturo...
: This paper analyses the requirements of automation and adaptation in the so called perceptive environments. These environments are places with the ability of perceiving the conte...
Route Flap Damping is a mechanism generally used in network routing protocols. Its goal is to limit the global impact of unstable routes by temporarily suppressing routes with rap...
Beichuan Zhang, Dan Pei, Daniel Massey, Lixia Zhan...
When players in online games engage in conversation with each other, often through a chat window, their graphical avatars typically do not exhibit interesting behavior. This paper ...