Sciweavers

2250 search results - page 173 / 450
» Authorizing applications in singularity
Sort
View
IUI
2009
ACM
15 years 7 months ago
A probabilistic mental model for estimating disruption
Adaptive software systems are intended to modify their appearance, performance or functionality to the needs and preferences of different users. A key bottleneck in building effec...
Bowen Hui, Grant Partridge, Craig Boutilier
CSCW
2010
ACM
15 years 7 months ago
Why the plan doesn't hold: a study of situated planning, articulation and coordination work in a surgical ward
Most studies of plans and situated work have applied ethnographic methods and and thus fail to provide any quantitative insight into the extent of this phenomenon. We present a st...
Jakob E. Bardram, Thomas Riisgaard Hansen
IROS
2009
IEEE
176views Robotics» more  IROS 2009»
15 years 5 months ago
Improving unmanned aerial vehicle pilot training and operation for flying in cluttered environments
— Future applications will bring unmanned aerial vehicles (UAVs) to new environments such as urban areas, causing a change in the way that UAVs are currently operated. However, U...
James T. Hing, Keith W. Sevcik, Paul Y. Oh
CANDC
2009
ACM
15 years 4 months ago
An empirical study of cognition and theatrical improvisation
This paper presents preliminary findings from our empirical study of the cognition employed by performers in improvisational theatre. Our study has been conducted in a laboratory ...
Brian Magerko, Waleed Manzoul, Mark Riedl, Allan B...
IEEEARES
2008
IEEE
15 years 4 months ago
WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc Networks
— Access control concerns in MANETs are very serious and considered as a crucial challenge for operators who prospects to employ unrivaled capabilities of such networks for diffe...
Amir R. Khakpour, Maryline Laurent-Maknavicius, Ha...