Sciweavers

2648 search results - page 277 / 530
» Human Factors In Computer Security
Sort
View
143
Voted
WWW
2004
ACM
16 years 4 months ago
VersaTutor: architecture for a constraint-based intelligent tutor generator
Intelligent tutoring systems have demonstrated their utility in a variety of domains. However, they are notoriously resource intensive to build. We report here on the development ...
Viswanathan Kodaganallur, Rob R. Weitz, David Rose...
122
Voted
SPAA
2009
ACM
16 years 4 months ago
Brief announcement: selfishness in transactional memory
In order to be efficient with selfish programmers, a multicore transactional memory (TM) system must be designed such that it is compatible with good programming incentives (GPI),...
Raphael Eidenbenz, Roger Wattenhofer
CVPR
2010
IEEE
15 years 11 months ago
Multilinear Pose and Body Shape Estimation of Dressed Subjects from Image Sets
In this paper we propose a multilinear model of human pose and body shape which is estimated from a database of registered 3D body scans in different poses. The model is generated...
Nils Hasler, Hanno Ackermann, Bodo Rosenhahn, Thor...
SAC
2010
ACM
15 years 10 months ago
CNL4DSA: a controlled natural language for data sharing agreements
A Data Sharing Agreement (DSA) is an agreement among contracting parties regulating how they share data. A DSA represents a flexible mean to assure privacy of data exchanged on t...
Ilaria Matteucci, Marinella Petrocchi, Marco Luca ...
SAC
2009
ACM
15 years 10 months ago
Cross-organizational ERP management: how to create a successful business case?
This paper deals with the development and use of business cases in support of cross-organizational enterprise resource planning (ERP)-enabled e-business integration initiatives. I...
Silja Eckartz, Maya Daneva, Roel Wieringa, Jos van...