Sciweavers

4480 search results - page 106 / 896
» Prototyping Completion with Constraints Using Computational ...
Sort
View
164
Voted
ACMACE
2004
ACM
15 years 9 months ago
AR-bowling: immersive and realistic game play in real environments using augmented reality
The game and entertainment industry plays an enormous role within the development and extensive usage of new technologies. They are one major technology driver concerning the deve...
Carsten Matysczok, Rafael Radkowski, Jan Berssenbr...
141
Voted
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
15 years 1 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
129
Voted
ACSAC
2007
IEEE
15 years 7 months ago
Distributed Secure Systems: Then and Now
The early 1980s saw the development of some rather sophisticated distributed systems. These were not merely networked file systems: rather, using remote procedure calls, hierarchi...
Brian Randell, John M. Rushby
142
Voted
LREC
2010
186views Education» more  LREC 2010»
15 years 5 months ago
WITcHCRafT: A Workbench for Intelligent exploraTion of Human ComputeR conversaTions
We present Witchcraft, an open-source framework for the evaluation of prediction models for spoken dialogue systems based on interaction logs and audio recordings. The use of Witc...
Alexander Schmitt, Gregor Bertrand, Tobias Heinrot...
RSP
2006
IEEE
125views Control Systems» more  RSP 2006»
15 years 9 months ago
Creation and Validation of Embedded Assertion Statecharts
This paper addresses the need to integrate formal assertions into the modeling, implementation, and testing of statechart based designs. The paper describes an iterative process f...
Doron Drusinsky, Man-tak Shing, Kadir Alpaslan Dem...