Sciweavers

320 search results - page 36 / 64
» Conditionals and consequences
Sort
View
CCS
2009
ACM
14 years 10 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
CHI
2007
ACM
14 years 10 months ago
Coordinating joint activity in avatar-mediated interaction
Massively multiplayer online games (MMOGs) currently represent the most widely used type of social 3D virtual worlds with millions of users worldwide. Although MMOGs take face-to-...
Robert J. Moore, E. Cabell Hankinson Gathman, Nico...
HPCA
2003
IEEE
14 years 10 months ago
Variability in Architectural Simulations of Multi-Threaded Workloads
Multi-threaded commercial workloads implement many important internet services. Consequently, these workloads are increasingly used to evaluate the performance of uniprocessor and...
Alaa R. Alameldeen, David A. Wood
CHI
2004
ACM
14 years 10 months ago
Towards caring machines
The perception of feeling cared for has beneficial consequences in education, psychotherapy, and medicine. Results from a longitudinal study of simulated caring by a computer are ...
Timothy W. Bickmore, Rosalind W. Picard
RECOMB
2005
Springer
14 years 10 months ago
Combinatorial Genetic Regulatory Network Analysis Tools for High Throughput Transcriptomic Data
: A series of genome-scale algorithms and high-performance implementations is described and shown to be useful in the genetic analysis of gene transcription. With them it is possib...
Elissa J. Chesler, Michael A. Langston