We introduce a method for predicting the network traffic that will be generated by Collaborative Virtual Environment applications with varying numbers of participants. Statistical...
Chris Greenhalgh, Steve Benford, Adrian Bullock, N...
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
This paper presents methodology for integrating a small, singlepoint laser range finder into a wearable augmented reality system. We first present a way of creating object-align...
Jason Wither, Christopher Coffin, Jonathan Ventura...
This paper describes an online learning method of color transformation for interactive object recognition. In order to recognize objects under various lighting conditions, the sys...
This paper introduces DressUp, a computerized system for designing dresses with 3D input using the form of the human body as a guide. It consists of a body-sized physical mannequi...
Amy Wibowo, Daisuke Sakamoto, Jun Mitani, Takeo Ig...