We investigate the question of whether a query can be answered using a set V of views. We first define the problem in information-theoretic terms: we say that V determines if V pr...
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
This study investigates how the psychological notion of affordance, known from human computer interface design, can be adopted for the analysis and design of communication of a use...
Ubiquitous communications require wireless networking and infrastructure network support. The first step is to look at how the different available technologies will integrate and w...
In this paper, we present a simple and robust Mixed Reality (MR) framework that allows for real-time interaction with Virtual Humans in real and virtual environments under consist...
Arjan Egges, George Papagiannakis, Nadia Magnenat-...