Keyphrases
- multi user
- virtual environment
- multi granularity
- virtual world
- augmented reality
- multi touch
- user interface
- query expansion
- single user
- information security
- multiple users
- security policies
- closed loop
- binary tree
- security issues
- access control
- key management
- network security
- security requirements
- dynamic model
- hierarchical structure
- tree structure
- intrusion detection
- decision trees
- statistical databases
- pseudo relevance feedback
- image processing
- privacy protection
- encryption scheme
- mobile devices