Sciweavers

2917 search results - page 552 / 584
» Adaptation and the effort needed to adapt
Sort
View
COGNITIVE
2001
Springer
15 years 6 months ago
Virtual Reality and Cognitive Processes
The relationship between our actions and their perceivable results is ruled by what we call the laws of nature. It is general understanding that our actions act upon real objects ...
Olaf Diettrich
ICSE
2001
IEEE-ACM
15 years 6 months ago
Generating Wrappers for Command Line Programs: The Cal-Aggie Wrap-O-Matic Project
Software developers writing new software have strong incentives to make their products compliant to standards such as corba, com, and JavaBeans. Standardscompliance facilitates in...
Eric Wohlstadter, Stoney Jackson, Premkumar T. Dev...
TES
2001
Springer
15 years 6 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
IUI
2000
ACM
15 years 6 months ago
Learning users' interests by unobtrusively observing their normal behavior
For intelligent interfaces attempting to learn a user’s interests, the cost of obtaining labeled training instances is prohibitive because the user must directly label each trai...
Jeremy Goecks, Jude W. Shavlik
CRYPTO
2000
Springer
136views Cryptology» more  CRYPTO 2000»
15 years 6 months ago
Long-Lived Broadcast Encryption
In a broadcast encryption scheme, digital content is encrypted to ensure that only privileged users can recover the content from the encrypted broadcast. Key material is usually he...
Juan A. Garay, Jessica Staddon, Avishai Wool