Sciweavers

144 search results - page 26 / 29
» A descriptive study of Microsoft's threat modeling technique
Sort
View
VR
2009
IEEE
188views Virtual Reality» more  VR 2009»
14 years 2 months ago
Crafting Personalized Facial Avatars Using Editable Portrait and Photograph Example
Computer-generated facial avatars have been increasingly used in a variety of virtual reality applications. Emulating the real-world face sculpting process, we present an interact...
Tanasai Sucontphunt, Zhigang Deng, Ulrich Neumann
CHI
2001
ACM
14 years 7 months ago
Single display privacyware: augmenting public displays with private information
The research area of Single Display Groupware (SDG) confronts the standard model of computing interaction, one user working on one computer, by investigating how to best support g...
Garth B. D. Shoemaker, Kori Inkpen
DLOG
2007
13 years 9 months ago
Optimizing Tableau Reasoning in ALC Extended with Uncertainty
Abstract. There has been an increased interest in recent years to incorporate uncertainty in Description Logics (DLs), and a number of proposals have been put forward for modeling ...
Volker Haarslev, Hsueh-Ieng Pai, Nematollaah Shiri
IJACTAICIT
2010
122views more  IJACTAICIT 2010»
13 years 4 months ago
Intelligent Integrated Management for Telecommunication Networks
As the size of communication networks keeps on growing, faster connections, cooperating technologies and the divergence of equipment and data communications, the management of the...
Antonio Martín, Carlos León, F&eacut...
JWSR
2007
172views more  JWSR 2007»
13 years 7 months ago
Service Class Driven Dynamic Data Source Discovery with DynaBot
: Dynamic Web data sources – sometimes known collectively as the Deep Web – increase the utility of the Web by providing intuitive access to data repositories anywhere that Web...
Daniel Rocco, James Caverlee, Ling Liu, Terence Cr...