Sciweavers

2399 search results - page 222 / 480
» On Authentication between Human and Computer
Sort
View
IJIS
2007
94views more  IJIS 2007»
15 years 5 months ago
The eightfold way of deliberation dialogue
Deliberation dialogues occur when two or more participants seek to jointly agree an action or a course of action in some situation. We present the first formal framework for such...
Peter McBurney, David Hitchcock, Simon Parsons
COLING
2002
15 years 5 months ago
An Automatic Evaluation Method for Localization Oriented Lexicalised EBMT System
To help developing a localization oriented EBMT system, an automatic machine translation evaluation method is implemented which adopts edit distance, cosine correlation and Dice c...
Jianmin Yao, Ming Zhou, Tiejun Zhao, Hao Yu, Sheng...
IPPS
2005
IEEE
15 years 11 months ago
Characterizing Secure Dynamic Web Applications Scalability
Security in the access to web contents and the interaction with web sites is becoming one of the most important issues in Internet. Servers need to provide certain levels of secur...
Jordi Guitart, Vicenç Beltran, David Carrer...
CHI
2003
ACM
16 years 5 months ago
Post-cognitivist HCI: second-wave theories
Historically, the dominant paradigm in HCI, when it appeared as a field in early 80s, was information processing ("cognitivist") psychology. In recent decades, as the fo...
Bonnie A. Nardi, Edwin Hutchins, James D. Hollan, ...
MHCI
2005
Springer
15 years 11 months ago
Three applications for mobile epidemic algorithms
This paper presents a framework for the pervasive sharing of data using wireless networks. ‘FarCry’ uses the mobility of users to carry files between separated networks. Throu...
Paul Tennent, Malcolm Hall, Barry Brown, Matthew C...