Sciweavers

851 search results - page 163 / 171
» A Framework of Syntactic Models for the Implementation of Vi...
Sort
View
SACMAT
2004
ACM
14 years 1 months ago
Using trust and risk in role-based access control policies
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their ...
Nathan Dimmock, András Belokosztolszki, Dav...
IJACTAICIT
2010
122views more  IJACTAICIT 2010»
13 years 4 months ago
Intelligent Integrated Management for Telecommunication Networks
As the size of communication networks keeps on growing, faster connections, cooperating technologies and the divergence of equipment and data communications, the management of the...
Antonio Martín, Carlos León, F&eacut...
AAI
1999
125views more  AAI 1999»
13 years 7 months ago
Deictic Believability: Coordinated Gesture, Locomotion, and Speech in Lifelike Pedagogical Agents
Lifelike animated agents for knowledge-based learning environments can provide timely, customized advice to support students' problem solving. Because of their strong visual ...
James C. Lester, Jennifer L. Voerman, Stuart G. To...
DAGSTUHL
2007
13 years 9 months ago
Interdisciplinary Design Research for End-User Software Engineering
rocesses involve modeling – simplifying or abstracting some aspects of the problem domain in order to plan and evaluate design decisions. The use of representations to reason abo...
Alan F. Blackwell
MOBISYS
2008
ACM
14 years 7 months ago
Cascadia: a system for specifying, detecting, and managing rfid events
Cascadia is a system that provides RFID-based pervasive computing applications with an infrastructure for specifying, extracting and managing meaningful high-level events from raw...
Evan Welbourne, Nodira Khoussainova, Julie Letchne...