On a wired network, physical authentication is implicitly provided by access: if a user is able to plug a cable into a network socket, he must have cleared other security checks s...
Three-dimensional user interfaces (3D UIs) support user tasks in many non-traditional interactive systems such as virtual environments, augmented reality, and ubiquitous computing...
Doug A. Bowman, Jian Chen, Chadwick A. Wingrave, J...
—The success of effective communication of traffic sign messages to road users may not only relate to the user characteristics but also the signs themselves. The purpose of this ...
This paper describes work in progress on the research project CWSpace, sponsored by the MIT and Microsoft Research iCampus program, to investigate the metadata standards and protoc...
action Model for a Grid Execution Framework Kaizar Amin,c,a Gregor von Laszewski,,a,b Mihael Hategan,b,a Rashid Al-Ali,d Omer Rana,d and David Walkerc aArgonne National Laboratory,...
Kaizar Amin, Gregor von Laszewski, Mihael Hategan,...