Sciweavers

4270 search results - page 708 / 854
» Implementation of interactive poster
Sort
View
108
Voted
DSS
2007
111views more  DSS 2007»
15 years 2 months ago
Applying question answering technology to locating malevolent online content
We have empirically compared two classes of technologies capable of locating potentially malevolent online content: 1) popular keyword searching, currently widely used by law enfo...
Dmitri Roussinov, Jose Antonio Robles-Flores
124
Voted
MAGS
2008
122views more  MAGS 2008»
15 years 2 months ago
Integrating embodied conversational agent components with a generic framework
Embodied Conversational Agents (ECAs) are computer generated life-like characters that interact with human users in face-to-face conversations. To achieve natural multi-modal conve...
Hung-Hsuan Huang, Aleksandra Cerekovic, Kateryna T...
111
Voted
ENTCS
2007
115views more  ENTCS 2007»
15 years 2 months ago
Self Management and the Future of Software Design
Most software is fragile: even the slightest error, such as changing a single bit, can make it crash. As software complexity has increased, development techniques have kept pace t...
Peter Van Roy
ENTCS
2007
113views more  ENTCS 2007»
15 years 2 months ago
On the Decidability of the Safety Problem for Access Control Policies
An access control system regulates the rights of users to gain access to resources in accordance with a specified policy. The rules in this policy may interact in a way that is n...
E. Kleiner, T. Newcomb
ENTCS
2007
118views more  ENTCS 2007»
15 years 2 months ago
Safe Adaptation of Component Coordination
In the domain of software engineering, the use of software components is now a well established approach. However, it raises problems about the dynamic adaptation of these compone...
Christophe Sibertin-Blanc, Philippe Mauran, G&eacu...