Sciweavers

168 search results - page 20 / 34
» A Troubleshooting Approach with Dependent Actions
Sort
View
SOCIALCOM
2010
13 years 7 months ago
Failure Feedback for User Obligation Systems
In recent years, several researchers have proposed techniques for providing users with assistance in understanding and overcoming authorization denials. The incorporation of envir...
Murillo Pontual, Keith Irwin, Omar Chowdhury, Will...
E4MAS
2005
Springer
14 years 3 months ago
The Governing Environment
Abstract. Whenever a multiagent system is designed, many dependencies in the system are identified and must be solved in a correct way. Coordination deals with the management of s...
Michael Schumacher, Sascha Ossowski
HICSS
2008
IEEE
118views Biometrics» more  HICSS 2008»
14 years 4 months ago
Towards a Methodology for Profiling Cyber Criminals
The progress of future e-business and ecommerce will depend on the ability of our legal institutions to protect general users from cyber crimes. While there has been substantial p...
Leonard Kwan, Pradeep Ray, Greg Stephens
ITNG
2007
IEEE
14 years 4 months ago
Human Computer Interaction Based Intrusion Detection
—In this paper we survey the state of the art in direct and indirect human computer interaction based biometrics. Direct HCI biometrics are based on abilities, style, preference,...
Roman V. Yampolskiy
AVSS
2005
IEEE
14 years 3 months ago
Multi-camera positioning to optimize task observability
The performance of computer vision systems for measurement, surveillance, reconstruction, gait recognition, and many other applications, depends heavily on the placement of camera...
Robert Bodor, Paul R. Schrater, Nikolaos Papanikol...