Sciweavers

1022 search results - page 67 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
LREC
2010
127views Education» more  LREC 2010»
14 years 11 months ago
Evaluation of the PIT Corpus Or What a Difference a Face Makes?
This paper presents the evaluation of the PIT Corpus of multi-party dialogues recorded in a Wizard-of-Oz environment. An evaluation has been performed with two different foci: Fir...
Petra-Maria Strauß, Stefan Scherer, Georg La...
ECAI
2006
Springer
15 years 1 months ago
Advanced Policy Explanations on the Web
Abstract. The frameworks for protecting security and privacy can be effective only if common users--with no training in computer science or logic--increase their awareness and cont...
Piero A. Bonatti, Daniel Olmedilla, Joachim Peer
SAC
2008
ACM
14 years 9 months ago
Contextualizing normative open multi-agent systems
Open MASs can be extremely dynamic due to heterogeneous agents that migrate among them to obtain resources or services not found locally. In order to prevent malicious actions and...
Carolina Howard Felicíssimo, Caroline Chopi...
TRIDENTCOM
2006
IEEE
15 years 3 months ago
EVEREST testbed: QoS management evaluation in B3G networks
This paper describes the motivation, methodology and implementation approach of the testbed that has been developed in the framework of the EVEREST project. Such testbed is used f...
Ramon Ferrús, Antoni Gelonch, Ferran Casade...
SAINT
2003
IEEE
15 years 3 months ago
Mobile Agent based realization of a distance evaluation system
The growth of the Internet has led to new avenues for distance education. A crucial factor for the success of distance education is effective mechanisms for distance evaluation. E...
Vikram Jamwal, Sridhar Iyer