Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
This paper describes the development of Papous, a Virtual Storyteller. Our ultimate goal is to obtain a synthetic character that tells stories in an expressive and believable way, ...
Users of mouse-replacement interfaces may have difficulty conforming to the motion requirements of their interface system. We have observed users with severe motor disabilities wh...
John J. Magee, Samuel Epstein, Eric S. Missimer, M...
Knowledge Management (KM) and E-Learning (EL) applications interface more and more as their objects of concern consist in ’captured knowledge’ resp. ’learning objects’, i....
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...