Sciweavers

672 search results - page 32 / 135
» An assessment of tag presentation techniques
Sort
View
ACNS
2007
Springer
165views Cryptology» more  ACNS 2007»
14 years 1 months ago
Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
We present two transforms to acquire chosen ciphertext security from tag based techniques. The first one requires the separability of underlying primitives. By separability, info...
Rui Zhang 0002
VRST
1999
ACM
14 years 10 hour ago
Testbed evaluation of virtual environment interaction techniques
As immersive virtual environment (VE) applications become more complex, it is clear that we need a rm understanding of the principles of VE interaction. In particular, designers n...
Doug A. Bowman, Donald B. Johnson, Larry F. Hodges
ATAL
2003
Springer
14 years 28 days ago
Tools and techniques for performance measurement of large distributed multiagent systems
Performance measurement of large distributed multiagent systems (MAS) offers challenges that must be addressed explicitly in the agent infrastructure. Performance data is widely d...
Aaron Helsinger, Richard Lazarus, William Wright, ...
VR
2011
IEEE
286views Virtual Reality» more  VR 2011»
12 years 11 months ago
Shadow walking: An unencumbered locomotion technique for systems with under-floor projection
When viewed from below, a user’s feet cast shadows onto the floor screen of an under-floor projection system, such as a sixsided CAVE. Tracking those shadows with a camera provi...
David J. Zielinski, Ryan P. McMahan, Rachel B. Bra...
WCE
2007
13 years 8 months ago
A Dynamic Method for the Evaluation and Comparison of Imputation Techniques
— Imputation of missing data is important in many areas, such as reducing non-response bias in surveys and maintaining medical documentation. Estimating the uncertainty inherent ...
Norman Solomon, Giles Oatley, Kenneth McGarry