This paper describes an application of the conversational agent Max in a real-world setting. The agent is employed as guide in a public computer museum, where he engages with visit...
Stefan Kopp, Lars Gesellensetter, Nicole C. Kr&aum...
Cryptographic protocols are useful for trust engineering in distributed transactions. Transactions require specific degrees of confidentiality and agreement between the principal...
Joshua D. Guttman, Jonathan C. Herzog, John D. Ram...
A multiagent architecture for vehicle and structural health monitoring is proposed. A prototype using this architecture was developed using JADE. Critical aspects of the design wer...
Albert C. Esterline, Bhanu Gandluri, Mannur Sundar...
The SMIL 2.0 Language profile support several mechanisms for controlling interactivity in a SMIL 2.0 presentation. Unfortunately, the SMIL standard testset does not verify complex...
: We present a novel approach for modeling hair using level-of-detail representations. The set of representations include individual strands, hair clusters, and hair strips. They a...
Kelly Ward, Ming C. Lin, Joohi Lee, Susan Fisher, ...