Sciweavers

80 search results - page 16 / 16
» What's in a character
Sort
View
DIM
2005
ACM
13 years 7 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
IADIS
2004
13 years 6 months ago
Challenges for Network Computer Games
Interactive entertainment and specifically computer games has grown into a multi-billion industry in the last few years and continues to grow. This expansion has fueled a number o...
Yusuf Pisan
AIED
2009
Springer
13 years 3 months ago
Investigating the Effects of Social Goals in a Negotiation Game with Virtual Humans
Educational games may be particularly suited to teaching social learning skills with virtual humans. We investigate the importance of social goals and engaging social interactions ...
Amy Ogan, Vincent Aleven, Christopher Jones
EUROMED
2010
13 years 2 months ago
Capture and Processing of High Resolution 3D-Data of Sutra Inscriptions in China
Modern high resolution 3D-measuring techniques are widely used in quality control and industrial production, because they allow precise and reliable inspection of objects. Their po...
Natalie Schmidt, Frank Boochs, Rainer Schütze
CSL
2011
Springer
13 years 6 days ago
Detecting emotional state of a child in a conversational computer game
The automatic recognition of user’s communicative style within a spoken dialog system framework, including the affective aspects, has received increased attention in the past f...
Serdar Yildirim, Shrikanth Narayanan, Alexandros P...