We have empirically compared two classes of technologies capable of locating potentially malevolent online content: 1) popular keyword searching, currently widely used by law enfo...
Embodied Conversational Agents (ECAs) are computer generated life-like characters that interact with human users in face-to-face conversations. To achieve natural multi-modal conve...
Hung-Hsuan Huang, Aleksandra Cerekovic, Kateryna T...
Most software is fragile: even the slightest error, such as changing a single bit, can make it crash. As software complexity has increased, development techniques have kept pace t...
An access control system regulates the rights of users to gain access to resources in accordance with a specified policy. The rules in this policy may interact in a way that is n...
In the domain of software engineering, the use of software components is now a well established approach. However, it raises problems about the dynamic adaptation of these compone...
Christophe Sibertin-Blanc, Philippe Mauran, G&eacu...