We present two transforms to acquire chosen ciphertext security from tag based techniques. The first one requires the separability of underlying primitives. By separability, info...
As immersive virtual environment (VE) applications become more complex, it is clear that we need a rm understanding of the principles of VE interaction. In particular, designers n...
Doug A. Bowman, Donald B. Johnson, Larry F. Hodges
Performance measurement of large distributed multiagent systems (MAS) offers challenges that must be addressed explicitly in the agent infrastructure. Performance data is widely d...
Aaron Helsinger, Richard Lazarus, William Wright, ...
When viewed from below, a user’s feet cast shadows onto the floor screen of an under-floor projection system, such as a sixsided CAVE. Tracking those shadows with a camera provi...
David J. Zielinski, Ryan P. McMahan, Rachel B. Bra...
— Imputation of missing data is important in many areas, such as reducing non-response bias in surveys and maintaining medical documentation. Estimating the uncertainty inherent ...