Sciweavers

232 search results - page 33 / 47
» Credentials-Based Authorization: Evaluation and Implementati...
Sort
View
SIGMOD
1995
ACM
148views Database» more  SIGMOD 1995»
15 years 9 months ago
Copy Detection Mechanisms for Digital Documents
In a digital library system, documents are available in digital form and therefore are more easily copied and their copyrights are more easily violated. This is a very serious pro...
Sergey Brin, James Davis, Hector Garcia-Molina
AAAI
2007
15 years 7 months ago
Towards Large Scale Argumentation Support on the Semantic Web
This paper lays theoretical and software foundations for a World Wide Argument Web (WWAW): a large-scale Web of inter-connected arguments posted by individuals to express their op...
Iyad Rahwan, Fouad Zablith, Chris Reed
145
Voted
IJCAI
2007
15 years 6 months ago
Towards Runtime Behavior Adaptation for Embodied Characters
Typically, autonomous believable agents are implemented using static, hand-authored reactive behaviors or scripts. This hand-authoring allows designers to craft expressive behavio...
Peng Zang, Manish Mehta, Michael Mateas, Ashwin Ra...
IJCAI
2001
15 years 6 months ago
Narrative Prose Generation
Story generation is experiencing a revival, despite disappointing preliminary results from the preceding three decades. One of the principle reasons for previous inadequacies was ...
Charles B. Callaway, James C. Lester
OAS
2003
15 years 6 months ago
Experiences with Ontology Development for Value-Added Publishing
This paper presents our practical experience of developing an ontology using the EXPLODE method for Value-Added Publishing. Value-Added Publishing is a relatively new area of elec...
Maia Hristozova, Leon Sterling