Search
Now showing items 91-96 of 96
Modulating application behaviour for closely coupled intrusion detection
(2003)
This thesis presents a security measure that is closely coupled to applications. This distinguishes it from conventional security measures which tend to operate at the infrastructure level (network, operating system or ...
Fast and accurate visibility preprocessing
(2003)
Currently, the standard approach to visibility preprocessing algorithms is to use a form of approximate solution, known as conservative culling. Such algorithms over-estimate the set of visible polygons. This compromise ...
A connectionist explanation of presence in virtual environments
(2003)
Presence has various definitions, but can be understood as the sensation that a virtual environment is a real place, that the user is actually in the virtual environment rather than at the display terminal, or that the ...
Music education software : an HCI evaluation of existing software and prototype implementation of an ear training programme based on a proposed approach
(2003)
This research paper uses Human Computer Interaction(HCI) evaluation methods, namely questionnaires and interviews, to obtain information about the kind of music software currently in common use in music departments, and ...
Attack analysis of cryptographic protocols using strand spaces
(2003)
Security protocols make use of cryptographic techniques to achieve goals such as confidentiality, authentication and integrity. However, the fact that strong cryptographic algorithms exist does not guarantee the security ...