Sciweavers

329 search results - page 55 / 66
» Towards a Theory of Actor Computation
Sort
View
IPCCC
2006
IEEE
15 years 3 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
ICRA
2009
IEEE
130views Robotics» more  ICRA 2009»
15 years 4 months ago
Qualitative robot localisation using information from cast shadows
— Recently, cognitive psychologists and others have turned their attention to the formerly neglected study of shadows, and the information they purvey. These studies show that th...
Paulo Santos, Hannah M. Dee, Valquiria Fenelon
AIED
2009
Springer
15 years 4 months ago
Discovering Tutorial Dialogue Strategies with Hidden Markov Models
Identifying effective tutorial strategies is a key problem for tutorial dialogue systems research. Ongoing work in human-human tutorial dialogue continues to reveal the complex phe...
Kristy Elizabeth Boyer, Eunyoung Ha, Michael D. Wa...
PERSUASIVE
2009
Springer
15 years 4 months ago
Persuading users through counseling dialogue with a conversational agent
We present an empirical study of the effect of a computer agent designed to engage a user in a persuasive counseling dialogue on attitudes towards regular exercise. We used two ma...
Daniel Schulman, Timothy W. Bickmore
83
Voted
WCNC
2008
IEEE
15 years 4 months ago
Link-Diversity Routing: A Robust Routing Paradigm for Mobile Ad Hoc Networks
—We present link-diversity routing, a routing paradigm that achieves high path resilience in mobile ad hoc networks. Link-diversity routing chooses each hop of a packet’s route...
Vincent Lenders, Rainer Baumann