![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 30 matches
- 2002
- Francesca Barrientos, John F. Canny:
Cursive: : controlling expressive avatar gesture using pen gesture. CVE 2002: 113-119 - Steve Benford
, Mike Fraser, Gail Reynard
, Boriana Koleva
, Adam Drozd:
Staging and evaluating public performances as an approach to CVE research. CVE 2002: 80-87 - Jim Blascovich:
A theoretical model of social influence for increasing the utility of collaborative virtual environments. CVE 2002: 25-30 - Lee Richard Bulmer, Peter M. Dew:
A study of collaboration using jigsaw puzzles. CVE 2002: 157-158 - Michael V. Capps:
Collaborative virtual entertainment: (if you can't beat 'em, join 'em?). CVE 2002: 63 - Giuseppe Conti, Giuliana Ucelli, Jelena Petric:
JCAD-VR: : a collaborative design tool for architects. CVE 2002: 153-154 - Peter M. Dew, Aphrodite Galata
, John Maxfield, Daniela Romano:
Virtual artefacts to support negotiation within an augmented collaborative environment for alternate dispute resolution. CVE 2002: 10-16 - Mike Fraser, Steve Benford
:
Interaction effects of virtual structures. CVE 2002: 128-134 - Pedro García López, Oriol Montalà, Carles Pairot, Robert Rallo, Antonio Fernandez Gómez-Skarmeta:
MOVE: : component groupware foundations for collaborative virtual environments. CVE 2002: 55-62 - Shin-ichi Hanaki, Suriyon Tansuriyavong, Masayoshi Endo:
Experiences in VILLA: a mixed reality space to support group activities. CVE 2002: 155-156 - G. Henri ter Hofte, Ingrid Mulder, Marjan Grootveld
, Robert Slagter:
Exploring a design space for place-based presence. CVE 2002: 151-152 - Mojtaba Hosseini, Steve Pettifer
, Nicolas D. Georganas:
Visibility-based interest management in collaborative virtual environments. CVE 2002: 143-144 - Andrzej Kapolka, Don McGregor, Michael V. Capps:
A unified component framework for dynamically extensible virtual environments. CVE 2002: 64-71 - Peter Kauff, Oliver Schreer
:
An immersive 3D video-conferencing system using shared virtual team user environments. CVE 2002: 105-112 - Dongman Lee, Mingyu Lim, Seunghyun Han:
ATLAS: a scalable network framework for distributed virtual environments. CVE 2002: 47-54 - John M. Linebarger, G. Drew Kessler:
GroupMorph: : a group collaboration mode approach to shared 3D virtual environments for product design. CVE 2002: 145-146 - Ian MacColl, David E. Millard, Cliff Randell, Anthony Steed
, Barry A. T. Brown, Steve Benford, Matthew Chalmers, Ruth Conroy Dalton, Nick Sheep Dalton, Areti Galani, Chris Greenhalgh, Danius T. Michaelides, Tom Rodden, Ian Taylor, Mark J. Weal:
Shared visiting in EQUATOR city. CVE 2002: 88-94 - Michal Masa, Jirí Zára:
Generalized interest management in virtual environments. CVE 2002: 149-150 - Kouichi Matsuda, Takahiro Miyake, Hirofumi Kawai:
Culture formation and its issues in personal agent-oriented virtual society: "PAW2". CVE 2002: 17-24 - Elaine M. Raybourn:
Just how important is 3D for CVEs? CVE 2002: 95-96 - Patrick M. Regan, Brian M. Slator:
Case-based tutoring in virtual education environments. CVE 2002: 2-9 - Roy A. Ruddle, Justin C. D. Savage, Dylan M. Jones:
Verbal communication during cooperative object manipulation. CVE 2002: 120-127 - Ernesto J. Sallés, James Bret Michael, Michael V. Capps, Don McGregor, Andrzej Kapolka:
Security of runtime extensible virtual environments. CVE 2002: 97-104 - Olov Ståhl, Anders Wallberg, Jonas Söderberg, Jan Humble, Lennart E. Fahlén, Adrian Bullock, Jenny Lundberg:
Information exploration using The Pond. CVE 2002: 72-79 - Karl E. Steiner, Tom Moher:
Encouraging task-related dialog in 2D and 3D shared narrative workspaces. CVE 2002: 39-46 - Vernor Vinge:
When cyberspace leaks into the real world. CVE 2002: 1 - Guangxin Yang:
A data management System for replicated application. CVE 2002: 147-148 - Huahai Yang, Gary M. Olson:
Exploring collaborative navigation: : the effect of perspectives on group performance. CVE 2002: 135-142 - Xiaolong Zhang
, George W. Furnas:
Social interactions in multiscale CVEs. CVE 2002: 31-38 - Wolfgang Broll, Chris Greenhalgh, Elizabeth F. Churchill:
Proceedings of the 4th International Conference on Collaborative Virtual Environments 2002, Bonn, Germany, September 30 - October 02, 2002. ACM 2002 [contents]
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-29 23:38 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint