Sciweavers

1401 search results - page 238 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
IUI
2003
ACM
14 years 1 months ago
Evolution of user interaction: the case of agent adele
Animated pedagogical agents offer promise as a means of making computer-aided learning more engaging and effective. To achieve this, an agent must be able to interact with the lea...
W. Lewis Johnson, Erin Shaw, Andrew Marshall, Cath...
AGENTS
1997
Springer
14 years 26 days ago
High-Level Planning and Low-Level Execution: Towards a Complete Robotic Agent
We have been developing Rogue, an architecture that integrates high-level planning with a low-level executing robotic agent. Rogue is designed as the oce gofer task planner for X...
Karen Zita Haigh, Manuela M. Veloso
PET
2009
Springer
14 years 3 months ago
APOD: Anonymous Physical Object Delivery
Delivery of products bought online can violate consumers’ privacy, although not in a straightforward way. In particular, delivery companies that have contracted with a website kn...
Elli Androulaki, Steven M. Bellovin
AGENTS
1997
Springer
14 years 26 days ago
Learning View Graphs for Robot Navigation
Abstract. We present a purely vision-based scheme for learning a topological representation of an open environment. The system represents selected places by local views of the surr...
Matthias O. Franz, Bernhard Schölkopf, Philip...
ACSAC
2000
IEEE
14 years 10 days ago
Dynamic Access Control through Petri Net Workflows
Access control is an important protection mechanism for information systems. An access control matrix grants subjects privileges to objects. Today, access control matrices are sta...
Konstantin Knorr