We present Beetle II, a tutorial dialogue system designed to accept unrestricted language input and support experimentation with different tutorial planning and dialogue strategies...
Myroslava Dzikovska, Diana Bental, Johanna D. Moor...
In this paper, we propose the use of the pairwise comparisons (PC) method for selection of strategies for software certification. This method can also be used to rank alternative s...
Waldemar W. Koczkodaj, Vova Babiy, Agnieszka D. Bo...
Policy specification for securing Web services is fast emerging as a key research area due to rapid proliferation of Web services in modern day enterprise applications. Whilst the...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...
Trust is arguably the most crucial aspect of agent acceptability. At its simplest level, it can be characterized in terms of judgments that people make concerning three factors: an...
Jeffrey M. Bradshaw, Hyuckchul Jung, Shriniwas Kul...
This paper addresses possible Distributed Denial-of-Service (DDoS) attacks toward the wireless Internet including the Wireless Extended Internet, the Wireless Portal Network, and t...