Sciweavers

232 search results - page 33 / 47
» Credentials-Based Authorization: Evaluation and Implementati...
Sort
View
SIGMOD
1995
ACM
148views Database» more  SIGMOD 1995»
14 years 1 months ago
Copy Detection Mechanisms for Digital Documents
In a digital library system, documents are available in digital form and therefore are more easily copied and their copyrights are more easily violated. This is a very serious pro...
Sergey Brin, James Davis, Hector Garcia-Molina
AAAI
2007
14 years 4 days ago
Towards Large Scale Argumentation Support on the Semantic Web
This paper lays theoretical and software foundations for a World Wide Argument Web (WWAW): a large-scale Web of inter-connected arguments posted by individuals to express their op...
Iyad Rahwan, Fouad Zablith, Chris Reed
IJCAI
2007
13 years 11 months ago
Towards Runtime Behavior Adaptation for Embodied Characters
Typically, autonomous believable agents are implemented using static, hand-authored reactive behaviors or scripts. This hand-authoring allows designers to craft expressive behavio...
Peng Zang, Manish Mehta, Michael Mateas, Ashwin Ra...
IJCAI
2001
13 years 11 months ago
Narrative Prose Generation
Story generation is experiencing a revival, despite disappointing preliminary results from the preceding three decades. One of the principle reasons for previous inadequacies was ...
Charles B. Callaway, James C. Lester
OAS
2003
13 years 11 months ago
Experiences with Ontology Development for Value-Added Publishing
This paper presents our practical experience of developing an ontology using the EXPLODE method for Value-Added Publishing. Value-Added Publishing is a relatively new area of elec...
Maia Hristozova, Leon Sterling