Sciweavers

1993 search results - page 75 / 399
» On Action Theory Change
Sort
View
121
Voted
LOGCOM
2002
142views more  LOGCOM 2002»
15 years 4 days ago
Two Logical Theories of Plan Recognition
We present a logical approach to plan recognition that builds on Kautz's theory of keyhole plan recognition, defined as the problem of inferring descriptions of high-level pl...
Wayne Wobcke
ESORICS
2010
Springer
15 years 1 months ago
A Theory of Runtime Enforcement, with Results
This paper presents a theory of runtime enforcement based on mechanism models called MRAs (Mandatory Results Automata). MRAs can monitor and transform security-relevant actions and...
Jay Ligatti, Srikar Reddy
94
Voted
HICSS
2007
IEEE
152views Biometrics» more  HICSS 2007»
15 years 6 months ago
Analyzing Online Information Privacy Concerns: An Information Processing Theory Approach
The advent of the Internet has made the transmission of personally identifiable information common and often inadvertent to the user. As a consequence, individuals worry that comp...
Il-Horn Hann, Kai Lung Hui, Sang-Yong Tom Lee, Iva...
HICSS
2010
IEEE
164views Biometrics» more  HICSS 2010»
15 years 7 months ago
Embodied Social Presence Theory
We discuss and reflect on the importance of embodiment, context, and spatial proximity as they pertain to the sense of presence obtained by individuals in virtual environments. We...
Brian E. Mennecke, Janea L. Triplett, Lesya M. Has...

Book
410views
16 years 10 months ago
Action Arcade Adventure Set
"Have you ever played a side-scrolling action arcade game on your PC and wondered what it takes to program one? How do the programmers scroll their backgrounds so fast and mak...
Diana Gruber