: Bugs in network application program can be exploited to compromise the system on which the application is running. When running these applications in an unsafe environment such a...
In this paper we want to share our experiences with implementing a scheme that enforces role based access control in a distributed, heterogeneous computing environment. This work ...
This paper presents semantic approach for a solution of the problem of interoperability for virtual worlds. The semantic of virtual worlds and virtual entities is described using ...
When an artifact is designed the typical output consists of documents describing the final result of a long series of deliberations and tradeoffs by the participants of collaborat...
This paper is concerned with how collaborative virtual environments can be structured in order to enable greater scalability and yet maintain a richness of communication. Based on...
Though the service of shared virtual worlds is an active area of research, little effort has been made to optimize such systems for urban world spaces. Tracking the motion, action...
Over the past two years, we have used the IRI (Interactive Remote Instruction) system to teach several live interactive classes with students in different cities. While this syste...
Ehab S. Al-Shaer, Alaa Youssef, Hussein M. Abdel-W...