Sciweavers

1265 search results - page 60 / 253
» Computer poker: A review
Sort
View
SAJ
2002
97views more  SAJ 2002»
14 years 9 months ago
PrivGuard : a model to protect private information based on its usage
No reliable method currently exists to safeguard the privacy of private information. Privacy policies are insufficient as compliance can not be enforced automatically. In this pap...
Frans A. Lategan, Martin S. Olivier
ICMI
2010
Springer
160views Biometrics» more  ICMI 2010»
14 years 7 months ago
Facilitating multiparty dialog with gaze, gesture, and speech
We study how synchronized gaze, gesture and speech rendered by an embodied conversational agent can influence the flow of conversations in multiparty settings. We review a computa...
Dan Bohus, Eric Horvitz
89
Voted
HICSS
2012
IEEE
291views Biometrics» more  HICSS 2012»
13 years 5 months ago
Product Performance Based Business Models: A Service Based Perspective
The migration to a service based economy has led many firms to emphasize the service component of their product offerings. This shift has led to the emergence of a business model ...
Morris A. Cohen
CHI
2000
ACM
15 years 2 months ago
Does computer-generated speech manifest personality? an experimental test of similarity-attraction
This study examines whether people would interpret and respond to paralinguistic personality cues in computergenerated speech in the same way as they do human speech. Participants...
Clifford Nass, Kwan Min Lee
ICALP
2009
Springer
15 years 4 months ago
Assigning Papers to Referees
Refereed conferences require every submission to be reviewed by members of a program committee (PC) in charge of selecting the conference program. There are many software packages...
Kurt Mehlhorn