In this paper, we describe the development of an Embodied Conversational Agent (ECA) implementing the concept of a companion, i.e. an agent supporting the persistent representatio...
Marc Cavazza, Cameron Smith, Daniel Charlton, Li Z...
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
In this paper, we report on an interactive system and the results ofa formal user study that was carried out with the aim of comparing two approaches to estimating users' int...
Boris Brandherm, Helmut Prendinger, Mitsuru Ishizu...
In model-based control, a planner uses a system description to create a plan that achieves production goals. The same model can be used by model-based diagnosis to indirectly infe...
Lukas Kuhn, Bob Price, Minh Binh Do, Juan Liu, Ron...
Major search engines currently use the history of a user's actions (e.g., queries, clicks) to personalize search results. In this paper, we present a new personalized service...