Sciweavers

2564 search results - page 107 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
111
Voted
ACMDIS
1997
ACM
15 years 7 months ago
A Case Study in Interactive Narrative Design
The paper describes lessons learned about the design of a form for interactive narrative. The lessons are based on an initial prototype and have ramifications for both a next-step...
Carol Strohecker
127
Voted
CA
2000
IEEE
15 years 7 months ago
A Thin Shell Volume for Modeling Human Hair
Hair-to-hair interaction is often ignored in human hair modeling, due to its computational and algorithmic complexity. In this paper, we present our experimental approach to simul...
Tae-Yong Kim 0002, Ulrich Neumann
105
Voted
ICPR
2008
IEEE
15 years 9 months ago
Human activities: Handling uncertainties using fuzzy time intervals
Persons may perform an activity in many different styles, or noise may cause an identical activity to have different temporal structures. We present a robust methodology for recog...
Michael S. Ryoo, Jake K. Aggarwal
144
Voted
CCE
2005
15 years 2 months ago
Interactive evolutionary computation in process engineering
In practical system identification, process optimization and controller design, it is often desirable to simultaneously handle several objectives and constraints. In some cases, t...
János Madár, János Abonyi, Fe...
147
Voted
IJBRA
2010
134views more  IJBRA 2010»
15 years 1 months ago
Deterministic graph-theoretic algorithm for detecting modules in biological interaction networks
—Accumulating evidence suggests that biological systems exhibit modular organization. Accurate identification of modularity is vital for understanding this organization. A recen...
Roger L. Chang, Feng Luo, Stuart Johnson, Richard ...