Sciweavers

4270 search results - page 708 / 854
» Implementation of interactive poster
Sort
View
DSS
2007
111views more  DSS 2007»
13 years 10 months ago
Applying question answering technology to locating malevolent online content
We have empirically compared two classes of technologies capable of locating potentially malevolent online content: 1) popular keyword searching, currently widely used by law enfo...
Dmitri Roussinov, Jose Antonio Robles-Flores
MAGS
2008
122views more  MAGS 2008»
13 years 10 months ago
Integrating embodied conversational agent components with a generic framework
Embodied Conversational Agents (ECAs) are computer generated life-like characters that interact with human users in face-to-face conversations. To achieve natural multi-modal conve...
Hung-Hsuan Huang, Aleksandra Cerekovic, Kateryna T...
ENTCS
2007
115views more  ENTCS 2007»
13 years 10 months ago
Self Management and the Future of Software Design
Most software is fragile: even the slightest error, such as changing a single bit, can make it crash. As software complexity has increased, development techniques have kept pace t...
Peter Van Roy
ENTCS
2007
113views more  ENTCS 2007»
13 years 10 months ago
On the Decidability of the Safety Problem for Access Control Policies
An access control system regulates the rights of users to gain access to resources in accordance with a specified policy. The rules in this policy may interact in a way that is n...
E. Kleiner, T. Newcomb
ENTCS
2007
118views more  ENTCS 2007»
13 years 10 months ago
Safe Adaptation of Component Coordination
In the domain of software engineering, the use of software components is now a well established approach. However, it raises problems about the dynamic adaptation of these compone...
Christophe Sibertin-Blanc, Philippe Mauran, G&eacu...