Sciweavers

2357 search results - page 76 / 472
» Computing Refactorings of Behavior Models
Sort
View
ICDCSW
2008
IEEE
15 years 4 months ago
On the Modeling of Honest Players in Reputation Systems
Reputation mechanisms are a key technique to trust assessment in large-scale decentralized systems. The effectiveness of reputation-based trust management fundamentally relies on ...
Qing Zhang, Ting Yu
CA
1995
IEEE
15 years 1 months ago
Dynamic simulation of splashing fluids
: In this paper we describe a method for modeling the dynamic behavior of splashing fluids. The model simulates the behavior of a fluid when objects impact or float on its surfa...
James F. O'Brien, Jessica K. Hodgins
113
Voted
IEEEARES
2006
IEEE
15 years 4 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
ICMI
2010
Springer
217views Biometrics» more  ICMI 2010»
14 years 8 months ago
Focusing computational visual attention in multi-modal human-robot interaction
Identifying verbally and non-verbally referred-to objects is an important aspect of human-robot interaction. Most importantly, it is essential to achieve a joint focus of attentio...
Boris Schauerte, Gernot A. Fink
EDM
2009
124views Data Mining» more  EDM 2009»
14 years 8 months ago
Detecting and Understanding the Impact of Cognitive and Interpersonal Conflict in Computer Supported Collaborative Learning Envi
This paper presents a model which can automatically detect a variety of student speech acts as students collaborate within a computer supported collaborative learning environment. ...
David Prata, Ryan Baker, Evandro Costa, Carolyn Pe...