Sciweavers

ESORICS
2011
Springer
13 years 9 months ago
Investigation of Signal and Message Manipulations on the Wireless Channel
We explore the suitability of Dolev-Yao-based attacker models for the security analysis of wireless communication. The Dolev-Yao model is commonly used for wireline and wireless ne...
Christina Pöpper, Nils Ole Tippenhauer, Boris...
INTERACT
2003
14 years 11 months ago
Intelligent Manipulation Techniques for Conceptual 3D Design
: One of the main operations in conceptual 3D design is the rearrangement of single and composite objects. This paper presents a new conceptual 3D design system that affords easy m...
Ji-Young Oh, Wolfgang Stürzlinger
85
Voted
GRAPHICSINTERFACE
2001
14 years 11 months ago
3D Scene Manipulation with 2D Devices and Constraints
Content creation for computer graphics applications is a laborious process that requires skilled personnel. One fundamental problem is that manipulation of 3D objects with 2D user...
Graham Smith, Wolfgang Stürzlinger, Tim Salzm...
71
Voted
CHI
2002
ACM
15 years 9 months ago
Comparing voodoo dolls and HOMER: exploring the importance of feedback in virtual environments
When creating techniques for manipulating objects at a distance in immersive virtual environments, researchers have primarily focused on increasing selection range, placement rang...
Jeffrey S. Pierce, Randy F. Pausch