Sciweavers

15778 search results - page 3051 / 3156
» Aikido and software engineering
Sort
View
COMPSAC
2009
IEEE
15 years 2 months ago
A Framework for Cost Sensitive Assessment of Intrusion Response Selection
Abstract—In recent years, cost-sensitive intrusion response has gained significant interest, mainly due to its emphasis on the balance between potential damage incurred by the i...
Chris Strasburg, Natalia Stakhanova, Samik Basu, J...
COMPSAC
2009
IEEE
15 years 2 months ago
Towards the Operational Semantics of User-Centric Communication Models
Abstract—The pervasiveness of complex communication services and the need for end-users to play a greater role in developing communication services have resulted in the creation ...
Yingbo Wang, Yali Wu, Andrew A. Allen, Barbara Esp...
COMPSAC
2009
IEEE
15 years 2 months ago
A Privacy Enhancing Approach for Identity Inference Protection in Location-Based Services
—Recent advances in mobile handheld devices have facilitated the ubiquitous availability of location based services. Systems which provide location based services have always bee...
Chowdhury Sharif Hasan, Sheikh Iqbal Ahamed, Moham...
IUI
2009
ACM
15 years 2 months ago
Simplified facial animation control utilizing novel input devices: a comparative study
Editing facial expressions of virtual characters is quite a complex task. The face is made up of many muscles, which are partly activated concurrently. Virtual faces with human exp...
Nikolaus Bee, Bernhard Falk, Elisabeth André
IUI
2009
ACM
15 years 2 months ago
Automatic design of a control interface for a synthetic face
Getting synthetic faces to display natural facial expressions is essential to enhance the interaction between human users and virtual characters. Yet traditional facial control te...
Nicolas Stoiber, Renaud Séguier, Gaspard Br...
« Prev « First page 3051 / 3156 Last » Next »