Sciweavers

341 search results - page 68 / 69
» A Security Engineering Process based on Patterns
Sort
View
ATAL
2009
Springer
14 years 19 days ago
Increasing the expressiveness of virtual agents: autonomous generation of speech and gesture for spatial description tasks
Embodied conversational agents are required to be able to express themselves convincingly and autonomously. Based on an empirial study on spatial descriptions of landmarks in dire...
Kirsten Bergmann, Stefan Kopp
PLDI
2003
ACM
13 years 11 months ago
Bug isolation via remote program sampling
We propose a low-overhead sampling infrastructure for gathering information from the executions experienced by a program’s user community. Several example applications illustrat...
Ben Liblit, Alexander Aiken, Alice X. Zheng, Micha...
CIKM
1997
Springer
13 years 10 months ago
Analysis and Design of Server Informative WWW-Sites
The access patterns of the users of a web-site are traditionally analyzed in order to facilitate the user access to the site's information. In this study, however, a systemat...
Amir M. Zarkesh, Jafar Adibi, Cyrus Shahabi, Reza ...
ICFP
2007
ACM
13 years 10 months ago
iTasks: executable specifications of interactive work flow systems for the web
In this paper we introduce the iTask system: a set of combinators to specify work flows in a pure functional language at a very high level of abstraction. Work flow systems are au...
Rinus Plasmeijer, Peter Achten, Pieter W. M. Koopm...
BMCBI
2008
130views more  BMCBI 2008»
13 years 6 months ago
A database of phylogenetically atypical genes in archaeal and bacterial genomes, identified using the DarkHorse algorithm
Background: The process of horizontal gene transfer (HGT) is believed to be widespread in Bacteria and Archaea, but little comparative data is available addressing its occurrence ...
Sheila Podell, Terry Gaasterland, Eric E. Allen