This paper presents a psychophysical analysis of the discrimination thresholds of human faces that are varied along different directions in Face Space. Generated by a 3D Morphable...
In this paper the control of exible joint manipulators is studied in detail. The model of N{axis exible joint manipulators are derived and reformulated in the form of singular per...
We analyze a secure routing protocol, Secure Path Vector (SPV), proposed in SIGCOMM 2004. SPV aims to provide authenticity for route announcements in the Border Gateway Protocol (...
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a computational point of view and can thus be modeled by simple means, for insta...
Tabletop groupware systems have natural advantages for collaboration, but they present a challenge for application designers because shared work and interaction progress in differe...