Much of the literature on rational cryptography focuses on analyzing the strategic properties of cryptographic protocols. However, due to the presence of computationallybounded pl...
This paper presents the design of a business-aligned information system (IS) from an actor-network perspective, viewing non-human intermediaries jointly as inscriptions and bounda...
While monadic second-order logic (MSO) has played a prominent role in model theoretic syntax, modal logics have been used in this context since its inception. When comparing propos...
The development of virtual reality (VR) art installations is faced with considerable difficulties, especially when one wishes to explore complex notions related to user interactio...
Marc Cavazza, Jean-Luc Lugrin, Simon Hartley, Marc...
We present a new definition of an implicit surface over a noisy point cloud, based on the weighted least squares approach. It can be evaluated very fast, but artifacts are signifi...