Sciweavers

5089 search results - page 968 / 1018
» Attention
Sort
View
IJISEC
2007
61views more  IJISEC 2007»
13 years 7 months ago
Identity-based key agreement protocols from pairings
In recent years, a large number of identity-based key agreement protocols from pairings have been proposed. Some of them are elegant and practical. However, the security of this ty...
Liqun Chen, Zhaohui Cheng, Nigel P. Smart
AI
2005
Springer
13 years 7 months ago
Explorations in engagement for humans and robots
This paper explores the concept of engagement, the process by which individuals in an interaction start, maintain and end their perceived connection one another. The paper reports...
Candace L. Sidner, Christopher Lee, Cory D. Kidd, ...
IJMMS
2007
195views more  IJMMS 2007»
13 years 7 months ago
Berlin Brain-Computer Interface - The HCI communication channel for discovery
The investigation of innovative Human–Computer Interfaces (HCI) provides a challenge for future interaction research and development. Brain–Computer Interfaces (BCIs) exploit ...
Roman Krepki, Gabriel Curio, Benjamin Blankertz, K...
IJNSEC
2007
125views more  IJNSEC 2007»
13 years 7 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
IJON
2007
80views more  IJON 2007»
13 years 7 months ago
To each his own: The caregiver's role in a computational model of gaze following
We investigate a computational model of the emergence of gaze following that is based on a generic basic set of mechanisms. Whereas much attention has been focused so far on the s...
Christof Teuscher, Jochen Triesch