Sciweavers

1818 search results - page 305 / 364
» How users use access control
Sort
View
UMUAI
1998
101views more  UMUAI 1998»
13 years 9 months ago
An Evidential Model for Tracking Initiative in Collaborative Dialogue Interactions
In this paper, we argue for the need to distinguish between task initiative and dialogue initiative, and present an evidential model for tracking shifts in both types of initiativ...
Jennifer Chu-Carroll, Michael K. Brown
TPDS
2010
103views more  TPDS 2010»
13 years 8 months ago
A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming
—Peer-to-peer (P2P) streaming has been widely deployed over the Internet. A streaming system usually has multiple channels, and peers may form multiple groups for content distrib...
Xing Jin, S.-H. Gary Chan, Wan-Ching Wong, Ali C. ...
ICMI
2010
Springer
213views Biometrics» more  ICMI 2010»
13 years 8 months ago
Toward natural interaction in the real world: real-time gesture recognition
Using a new hand tracking technology capable of tracking 3D hand postures in real-time, we developed a recognition system for continuous natural gestures. By natural gestures, we ...
Ying Yin, Randall Davis
IEEEARES
2010
IEEE
14 years 3 months ago
Detection of Spyware by Mining Executable Files
Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and...
Raja Khurram Shahzad, Syed Imran Haider, Niklas La...
AVI
2008
14 years 14 days ago
Exploring emotions and multimodality in digitally augmented puppeteering
Recently, multimodal and affective technologies have been adopted to support expressive and engaging interaction, bringing up a plethora of new research questions. Among the chall...
Lassi A. Liikkanen, Giulio Jacucci, Eero Huvio, To...