Sciweavers

797 search results - page 114 / 160
» Towards a Generalized Interaction Scheme for Information Acc...
Sort
View
CCS
2004
ACM
15 years 7 months ago
MAC and UML for secure software design
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...
DSN
2002
IEEE
15 years 6 months ago
Ditto Processor
Concentration of design effort for current single-chip Commercial-Off-The-Shelf (COTS) microprocessors has been directed towards performance. Reliability has not been the primary ...
Shih-Chang Lai, Shih-Lien Lu, Jih-Kwon Peir
CPAIOR
2009
Springer
15 years 8 months ago
Learning How to Propagate Using Random Probing
Abstract. In constraint programming there are often many choices regarding the propagation method to be used on the constraints of a problem. However, simple constraint solvers usu...
Efstathios Stamatatos, Kostas Stergiou
PERSUASIVE
2009
Springer
15 years 8 months ago
Persuading users through counseling dialogue with a conversational agent
We present an empirical study of the effect of a computer agent designed to engage a user in a persuasive counseling dialogue on attitudes towards regular exercise. We used two ma...
Daniel Schulman, Timothy W. Bickmore
ICMCS
2008
IEEE
146views Multimedia» more  ICMCS 2008»
15 years 8 months ago
Joint-processing of audio-visual signals in human perception of conflicting synthetic character emotions
Expressive audio-visual synthetic characters are increasingly employed in research and commercial applications. However, the mechanism that people employ to interpret conflicting...
Emily Mower, Sungbok Lee, Maja J. Mataric, Shrikan...