Harris, L, Jenkin, M., and Zikovitz, D. C., Vestibular cues and virtual environments: choosing the magnitude of the vestibular cue, Proc. 1st IEEE Int. Conf. on Virtual Reality, 1999. Copyright IEEE.
The design of virtual environments usually concentrates on constructing a realistic visual simulation and ignores the non-visual cues normally associated with moving through an environment. THe lack of the normal complement of cues may contribute to cybersickness and may affect operator performance. In [5] we described the effect of adding vestibular cues during passive linear motion and showed an unexpected dominance of the vestibular cue in determining the magnitude of the perceived motion. Here we vary the relative magnitude of the visual and vestibular cues and describe a simple linear summation model that predicts the resulting perceived mangnitude of mtion. The model suggests that designers of virtual reality displays should add vestibular information in a ratio of one to four with the visual motion to obtain convincing and accurate performance.
Dymond, P, and Jenkin, M. WWW distribution of private information with watermarking, Proc 32st Hawaii Int. Conf. on System Sciences, 1999.
This paper considers the use of browser plugins and Java code (within standard HTTP mechanisms) to serve private confidential documents securely over the World Wide Web to a group of mobile of otherwise distributed users. Web secruity mechanisms typically require use of either an underlying security system for transport mechanism (e.g., SSL[7]) alternate servers and data streams (e.g., S-HTTP[9]), security-oriented plugsin within the browser (e.g., [6]), or helper applications (e.g., [11]). The method describe here operates by providing a per-user security mechanism coded in Java which operates as part of a standard web-browser environment. This system appears to be very appropriate for serving lower-security, non-public documents, files and images to a group of heterogeneous users over the world wide web. It can also be appropriate in circumstances where the standard security mechanisms are not available. We also describe an adaptation which provides automatic per-user "watermarking" of decoded pages to allow identification of the decoder.