Sciweavers

152 search results - page 24 / 31
» Improved computational models of human behavior in security ...
Sort
View
DIM
2005
ACM
13 years 9 months ago
Usable presentation of secure pseudonyms
Privacy-Enhancing Identity Management (PIM) enables users to control which personal information they provide to their communication partner(s) by partitioning their personal infor...
Katrin Borcea-Pfitzmann, Elke Franz, Andreas Pfitz...
APNOMS
2008
Springer
13 years 9 months ago
Application of Data Mining to Network Intrusion Detection: Classifier Selection Model
As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a critical component to secure the netwo...
Huy Anh Nguyen, Deokjai Choi
LAWEB
2003
IEEE
14 years 12 days ago
Extracting Knowledge from Association Relationships to Build Navigational Models
This paper analyzes how the semantics of association relationships in OO conceptual modeling can help to build Navigational Models for Web Applications. The work has been develope...
Manoli Albert, Vicente Pelechano, Joan Fons, Gonza...
ICCV
2007
IEEE
14 years 1 months ago
Pose and Gaze Estimation in Multi-camera Networks for Non-restrictive HCI
Multi-camera networks offer potentials for a variety of novel human-centric applications through provisioning of rich visual information. In this paper, face orientation analysis ...
Chung-Ching Chang, Chen Wu, Hamid K. Aghajan
AGENTS
2000
Springer
13 years 11 months ago
Interactive pedagogical drama
This paper describes an agent-based approach to realizing interactive pedagogical drama. Characters choose their actions autonomously, while director and cinematographer agents ma...
Stacy Marsella, W. Lewis Johnson, Catherine LaBore