Sciweavers

3022 search results - page 115 / 605
» Make Way for WayMaker
Sort
View
132
Voted
VRCAI
2009
ACM
15 years 7 months ago
Modelling socially intelligent virtual humans
In this paper, we mention about various techniques in order to create ”socially intelligent virtual humans” which can interact with people using natural ways of communication....
Nadia Magnenat-Thalmann
ACSAC
2008
IEEE
15 years 7 months ago
The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies
Role hierarchies are fundamental to the role based access control (RBAC) model. The notion of role hierarchy is a well understood concept that allows senior roles to inherit the p...
Qi Guo, Jaideep Vaidya, Vijayalakshmi Atluri
91
Voted
ICSEA
2008
IEEE
15 years 7 months ago
Reuse through Requirements Traceability
The Reuse of code artefacts can make development quicker, cheaper and more robust, but the process is complex and has many pitfalls: Code artefacts must exist, be available, be fo...
Rob Pooley, Craig Warren
75
Voted
HICSS
2007
IEEE
85views Biometrics» more  HICSS 2007»
15 years 7 months ago
A Program of Study of the Use of Stories in DSS
Storytelling is an innate human characteristic. Stories are used to manage meaning, control behavior, and facilitate identification and bonding [9]. The theory of identification a...
David B. Paradice
99
Voted
ICDE
2007
IEEE
125views Database» more  ICDE 2007»
15 years 7 months ago
Improved Buffer Size Adaptation through Cache/Controller Coupling
Database workloads seldom remain static. A system tuned by an expert for the current environment, might not always remain optimal. To deal with this situation, database systems ha...
Christian A. Lang, Bishwaranjan Bhattacharjee, Tim...