Sciweavers

1818 search results - page 117 / 364
» How users use access control
Sort
View
DRM
2003
Springer
14 years 2 months ago
Digital rights management in a 3G mobile phone and beyond
In this paper we examine how copyright protection of digital items can be securely managed in a 3G mobile phone and other devices. First, the basic concepts, strategies, and requi...
Thomas S. Messerges, Ezzat A. Dabbish
CCS
2005
ACM
14 years 2 months ago
PeerAccess: a logic for distributed authorization
This paper introduces the PeerAccess framework for reasoning about authorization in open distributed systems, and shows how a parameterization of the framework can be used to reas...
Marianne Winslett, Charles C. Zhang, Piero A. Bona...
COBUILD
1999
Springer
14 years 1 months ago
OWL: An Object-Oriented Framework for Intelligent Home and Office Applications
The goal of OWL (Object-Oriented Workplace Laboratory) is to provide an object-oriented and component-based framework that supports the engineering of applications for the design, ...
Bernd Brügge, Ralf Pfleghar, Thomas Reicher
AAMAS
2010
Springer
13 years 9 months ago
Teaching a pet-robot to understand user feedback through interactive virtual training tasks
Abstract In this paper, we present a human-robot teaching framework that uses "virtual" games as a means for adapting a robot to its user through natural interaction in a...
Anja Austermann, Seiji Yamada
JBI
2006
105views Bioinformatics» more  JBI 2006»
13 years 9 months ago
User modeling and adaptation in health promotion dialogs with an animated character
In this paper, we describe our experience with the design and implementation of an embodied conversational agent (ECA) that converses with users in order to change their dietary b...
Fiorella de Rosis, Nicole Novielli, Valeria Carofi...