Sciweavers

570 search results - page 33 / 114
» How to Evaluate Models of User Affect
Sort
View
ISPEC
2007
Springer
14 years 2 months ago
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols
Denial of Service (DoS) attacks are a virulent type of attack on the availability of networks’ intended services and resources. Defense against DoS attacks has been built into th...
Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyon...
AOSE
2007
Springer
13 years 12 months ago
Refining Goal Models by Evaluating System Behaviour
Abstract. Nowadays, information systems have to perform in complex, heterogeneous environments, considering a variety of system users with different needs and preferences. Software...
Mirko Morandini, Loris Penserini, Anna Perini, Ang...
CGF
2006
83views more  CGF 2006»
13 years 7 months ago
Seamless Integration of Initial Sketching and Subsequent Detail Editing in Flower Modeling
We present an interactive modeling system for flower composition that supports seamless transformation from an initial sketch to a detailed three-dimensional (3D) model. To begin,...
Takashi Ijiri, Shigeru Owada, Takeo Igarashi
INTERACT
2007
13 years 9 months ago
Face-to-Face Sociability Signs Made Explicit in CMC
This paper discusses how semiotic engineering can support the formulation of problems and solutions involved in handling face-to-face (F2F) sociability models in computer-mediated ...
Carla Faria Leitão, Clarisse Sieckenius de ...
ASUNAM
2010
IEEE
13 years 6 months ago
Mining Interaction Behaviors for Email Reply Order Prediction
—In email networks, user behaviors affect the way emails are sent and replied. While knowing these user behaviors can help to create more intelligent email services, there has no...
Byung-Won On, Ee-Peng Lim, Jing Jiang, Amruta Pura...