Sciweavers

152 search results - page 23 / 31
» Improved computational models of human behavior in security ...
Sort
View
CHI
2005
ACM
15 years 10 months ago
Children's and adults' multimodal interaction with 2D conversational agents
Few systems combine both Embodied Conversational Agents (ECAs) and multimodal input. This research aims at modeling the behavior of adults and children during their multimodal int...
Jean-Claude Martin, Stéphanie Buisine
AAAI
2006
14 years 11 months ago
Using an Ontology for Knowledge Acquisition
We describe an approach to distributed knowledge acquisition using an ontology. The ontology is used to represent and reason about soldier performance. These methods are embedded ...
Stacy Lovell, Webb Stacy
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 1 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
AIRWEB
2008
Springer
14 years 11 months ago
A large-scale study of automated web search traffic
As web search providers seek to improve both relevance and response times, they are challenged by the ever-increasing tax of automated search query traffic. Third party systems in...
Gregory Buehrer, Jack W. Stokes, Kumar Chellapilla
SOUPS
2009
ACM
15 years 4 months ago
Challenges in supporting end-user privacy and security management with social navigation
Social navigation is a promising approach for supporting privacy and security management. By aggregating and presenting the choices made by others, social navigation systems can p...
Jeremy Goecks, W. Keith Edwards, Elizabeth D. Myna...