We explore the suitability of Dolev-Yao-based attacker models for the security analysis of wireless communication. The Dolev-Yao model is commonly used for wireline and wireless ne...
: One of the main operations in conceptual 3D design is the rearrangement of single and composite objects. This paper presents a new conceptual 3D design system that affords easy m...
Content creation for computer graphics applications is a laborious process that requires skilled personnel. One fundamental problem is that manipulation of 3D objects with 2D user...
When creating techniques for manipulating objects at a distance in immersive virtual environments, researchers have primarily focused on increasing selection range, placement rang...