Sciweavers

303 search results - page 45 / 61
» Unifying Theories of Confidentiality
Sort
View
ACII
2005
Springer
15 years 5 months ago
An Adaptive Personality Model for ECAs
Curtin University’s Talking Heads (TH) combine an MPEG-4 compliant Facial Animation Engine (FAE), an Text To Emotional Speech Synthesiser (TTES), a multi-modal Dialogue Manager (...
He Xiao, Donald Reid, Andrew Marriott, E. K. Gulla...
VRST
2004
ACM
15 years 5 months ago
Modeling and rendering of walkthrough environments with panoramic images
An important, potential application of image-based techniques is to create photo-realistic image-based environments for interactive walkthrough. However, existing image-based stud...
Angus M. K. Siu, Ada S. K. Wan, Rynson W. H. Lau
IBERAMIA
2004
Springer
15 years 5 months ago
Decomposing Ordinal Sums in Neural Multi-adjoint Logic Programs
The theory of multi-adjoint logic programs has been introduced as a unifying framework to deal with uncertainty, imprecise data or incomplete information. From the applicative part...
Jesús Medina, Enrique Mérida Caserme...
106
Voted
PODS
2010
ACM
249views Database» more  PODS 2010»
15 years 4 months ago
Semantic query optimization in the presence of types
Both semantic and type-based query optimization rely on the idea that queries often exhibit non-trivial rewritings if the state space of the database is restricted. Despite their ...
Michael Meier 0002, Michael Schmidt, Fang Wei, Geo...
AGENTS
2001
Springer
15 years 4 months ago
Representing social structures in UML
From a software engineering perspective, agent systems are a specialization of object-oriented (OO) systems, in which individual objects have their own threads of control and thei...
H. Van Dyke Parunak, James Odell