Sciweavers

5722 search results - page 965 / 1145
» Security Function Interactions
Sort
View
115
Voted
MLMI
2007
Springer
15 years 9 months ago
Towards an Objective Test for Meeting Browsers: The BET4TQB Pilot Experiment
This paper outlines first the BET method for task-based evaluation of meeting browsers. ‘Observations of interest’ in meetings are empirically determined by neutral observers ...
Andrei Popescu-Belis, Philippe Baudrion, Mike Flyn...
135
Voted
OTM
2007
Springer
15 years 9 months ago
Spontaneous Privacy Policy Negotiations in Pervasive Environments
Abstract. Privacy issues are a major burden for the acceptance of pervasive applications. They may ultimately result in the rejection of new services despite their functional bene...
Sören Preibusch
PPDP
2007
Springer
15 years 9 months ago
Putting declarative programming into the web: translating curry to javascript
We propose a framework to construct web-oriented user interfaces in a high-level way by exploiting declarative programming techniques. Such user interfaces are intended to manipul...
Michael Hanus
SG
2007
Springer
15 years 9 months ago
Highly Realistic 3D Presentation Agents with Visual Attention Capability
This research proposes 3D graphical agents in the role of virtual presenters with a new type of functionality – the capability to process and respond to visual attention of users...
Arjen Hoekstra, Helmut Prendinger, Nikolaus Bee, D...
125
Voted
BIBE
2006
IEEE
160views Bioinformatics» more  BIBE 2006»
15 years 9 months ago
Methods for Random Modularization of Biological Networks
— Biological networks are formalized summaries of our knowledge about interactions among biological system components, like genes, proteins, or metabolites. From their global top...
Zachary M. Saul, Vladimir Filkov