Sciweavers

5722 search results - page 524 / 1145
» Security Function Interactions
Sort
View
CHI
1993
ACM
15 years 9 months ago
Preserving knowledge in design projects: what designers need to know
In order to inform the design of technology support and new procedural methodsfor softwaredesign,we analyzed the content of real design meetingsin threeorganizations, focusing in ...
James D. Herbsleb, Eiji Kuwana
135
Voted
CHI
1993
ACM
15 years 9 months ago
A Wizard of Oz platform for the study of multimodal systems
The Wizard of Oz (WOz) technique is an experimental evaluation mechanism. It allows the observation of a user operating an apparently fully functioning system whose missing servic...
Daniel Salber, Joëlle Coutaz
110
Voted
AAAI
1998
15 years 6 months ago
Managing Multiple Tasks in Complex, Dynamic Environments
Sketchy planners are designed to achieve goals in realistically complex, time-pressured, and uncertain task environments. However, the ability to manage multiple, potentially inte...
Michael Freed
147
Voted
ACL
1997
15 years 6 months ago
Sentence Planning as Description Using Tree Adjoining Grammar
We present an algorithm for simultaneously constructing both the syntax and semantics of a sentence using a Lexicalized Tree Adjoining Grammar (LTAG). This approach captures natur...
Matthew Stone, Christine Doran
SWAP
2007
15 years 6 months ago
Links and Cycles of Web Databases
This paper proposes a novel framework for composing web databases. Web databases are assumed to have explicit descriptions of I/O attributes and are considered as components of fun...
Masao Mori, Tetsuya Nakatoh, Sachio Hirokawa