Sciweavers

2261 search results - page 333 / 453
» Dynamic types for authentication
Sort
View
IVA
2009
Springer
14 years 3 months ago
A Study into Preferred Explanations of Virtual Agent Behavior
Virtual training systems provide an effective means to train people for complex, dynamic tasks such as crisis management or firefighting. Intelligent agents are often used to pl...
Maaike Harbers, Karel van den Bosch, John-Jules Ch...
MIDDLEWARE
2009
Springer
14 years 3 months ago
Middleware for Pervasive Spaces: Balancing Privacy and Utility
Abstract. Middleware for pervasive spaces has to meet conflicting requirements. It has to both maximize the utility of the information exposed and ensure that this information doe...
Daniel Massaguer, Bijit Hore, Mamadou H. Diallo, S...
MIG
2009
Springer
14 years 3 months ago
A Semantic Navigation Model for Video Games
Abstract. Navigational performance of artificial intelligence (AI) characters in computer games is gaining an increasingly important role in the perception of their behavior. Whil...
Leonard van Driel, Rafael Bidarra
OOPSLA
2009
Springer
14 years 3 months ago
Coherent reaction
Side effects are both the essence and bane of imperative programming. The programmer must carefully coordinate actions to manage their side effects upon each other. Such coordinat...
Jonathan Edwards
AINA
2008
IEEE
14 years 3 months ago
Adaptive QoS-Aware Resource Management in Heterogeneous Wireless Networks
The integration of different IP-based wireless networks, such as WiMAX and WiFi, becomes a 2-tier heterogeneous wireless networks is a more and more popular issue. In order to supp...
I-Shyan Hwang, Bor-Jiunn Hwang, K. Robert Lai, Lin...