Abstract. We describe a visual communication application for a dark, theaterlike interactive virtual simulation training environment. Our system visually estimates and tracks the b...
We discuss and reflect on the importance of embodiment, context, and spatial proximity as they pertain to the sense of presence obtained by individuals in virtual environments. We...
Brian E. Mennecke, Janea L. Triplett, Lesya M. Has...
Privacy preserving data mining has been investigated extensively. The previous works mainly fall into two categories, perturbation and randomization based approaches and secure mu...
Li Liu, Murat Kantarcioglu, Bhavani M. Thuraisingh...
Testing can be difficult to integrate into software development. Approaches to software testing in relation to implementing software are based on the V-model of testing. The softw...
—One popular solution for reducing the resource consumption of Intrusion Detection System (IDS) in MANET is to elect a head-cluster (leader) to provide intrusion detection servic...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...