Sciweavers

949 search results - page 144 / 190
» Design methods for security and trust
Sort
View
CHI
2005
ACM
16 years 4 months ago
Acceptance and usability of a relational agent interface by urban older adults
This study examines the acceptance and usability of an animated conversational agent designed to establish longterm relationships with older, mostly minority adult users living in...
Timothy W. Bickmore, Lisa Caruso, Kerri Clough-Gor...
CEEMAS
2007
Springer
15 years 10 months ago
Collaborative Attack Detection in High-Speed Networks
We present a multi-agent system designed to detect malicious traffic in high-speed networks. In order to match the performance requirements related to the traffic volume, the net...
Martin Rehák, Michal Pechoucek, Pavel Celed...
EUROCAST
2005
Springer
182views Hardware» more  EUROCAST 2005»
15 years 10 months ago
Computer Vision Application: Real Time Smart Traffic Light
Abstract. The design, development, construction and testing of an ArtificialVision controlled Traffic-Light prototype has been carried out to rule and regulate intersections. Metho...
Ángel Serrano, Cristina Conde, Licesio J. R...
CORR
2011
Springer
140views Education» more  CORR 2011»
14 years 8 months ago
A Wiki for Business Rules in Open Vocabulary, Executable English
The problem of business-IT alignment is of widespread economic concern. As one way of addressing the problem, this paper describes an online system that functions as a kind of Wik...
Adrian Walker
KDD
2005
ACM
146views Data Mining» more  KDD 2005»
16 years 4 months ago
Anonymity-preserving data collection
Protection of privacy has become an important problem in data mining. In particular, individuals have become increasingly unwilling to share their data, frequently resulting in in...
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright