Sciweavers

826 search results - page 43 / 166
» What Triggers a Behavior
Sort
View
63
Voted
TACAS
2007
Springer
67views Algorithms» more  TACAS 2007»
15 years 6 months ago
Searching for Shapes in Cryptographic Protocols
Abstract. We describe a method for enumerating all essentially different executions possible for a cryptographic protocol. We call them the shapes of the protocol. Naturally occur...
Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Th...
ICMI
2005
Springer
108views Biometrics» more  ICMI 2005»
15 years 6 months ago
Understanding the effect of life-like interface agents through users' eye movements
We motivate an approach to evaluating the utility of lifelike interface agents that is based on human eye movements rather than questionnaires. An eye tracker is employed to obtai...
Helmut Prendinger, Chunling Ma, Jin Yingzi, Arturo...
86
Voted
JUCS
2008
129views more  JUCS 2008»
15 years 22 days ago
Easing the Smart Home: Semi-automatic Adaptation in Perceptive Environments
: This paper analyses the requirements of automation and adaptation in the so called perceptive environments. These environments are places with the ability of perceiving the conte...
Manuel García-Herranz, Pablo A. Haya, Abrah...
ICDCS
2005
IEEE
15 years 6 months ago
Timer Interaction in Route Flap Damping
Route Flap Damping is a mechanism generally used in network routing protocols. Its goal is to limit the global impact of unstable routes by temporarily suppressing routes with rap...
Beichuan Zhang, Dan Pei, Daniel Massey, Lixia Zhan...
101
Voted
IWEC
2004
15 years 2 months ago
Animating Conversation in Online Games
When players in online games engage in conversation with each other, often through a chat window, their graphical avatars typically do not exhibit interesting behavior. This paper ...
Hannes Högni Vilhjálmsson