To safely and efficiently guide search and rescue operations in disaster areas, gathering of relevant information such as the locations of victims, must occur swiftly. Using the c...
Janice L. Pearce, Paul E. Rybski, Sascha Stoeter, ...
The last few years have seen great maturation in understanding how to use computer graphics technology to portray 3D embodied characters or virtual humans. Unlike the off-line, an...
Norman I. Badler, Jan M. Allbeck, Liwei Zhao, Meer...
Abstract. In practice, most computer intrusions begin by misusing programs in clever ways to obtain unauthorized higher levels of privilege. One e ective way to detect intrusive ac...
Anup K. Ghosh, Christoph C. Michael, Michael Schat...
The Restricted Focus Viewer (RFV) relates a small part of an otherwise blurred display to the focus of visual attention. A user controls which part of the screen is in focus by us...
As applications for artificially intelligent agents increase in complexity we can no longer rely on clever heuristics and hand-tuned behaviors to develop their programming. Even t...
Shawn Arseneau, Wei Sun, Changpeng Zhao, Jeremy R....