Sciweavers

2435 search results - page 202 / 487
» Intellexer Question Answering
Sort
View
IFIP
2007
Springer
15 years 10 months ago
Insider Threat Analysis Using Information-Centric Modeling
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...
IVA
2007
Springer
15 years 10 months ago
Creating Rapport with Virtual Agents
Abstract. Recent research has established the potential for virtual characters to establish rapport with humans through simple contingent nonverbal behaviors. We hypothesized that ...
Jonathan Gratch, Ning Wang, Jillian Gerten, Edward...
KES
2007
Springer
15 years 10 months ago
Conceptual Enrichment of Locations Pointed Out by the User
Abstract. The growing availability of GPS and localization technologies in general opens up new challenges regarding the use of position information for Location Based Services. As...
Ana O. Alves, Raquel Hervás, Francisco C. P...
KI
2007
Springer
15 years 10 months ago
Semantic Graph Visualisation for Mobile Semantic Web Interfaces
Information visualisation benefits from the Semantic Web: multimodal mobile interfaces to the Semantic Web offer access to complex knowledge and information structures. Natural l...
Daniel Sonntag, Philipp Heim
RR
2007
Springer
15 years 10 months ago
A Rule-Based Approach for Reasoning About Collaboration Between Smart Web Services
We present a vision of smart, goal-oriented web services that reason about other services’ policies and evaluate the possibility of future interactions. We assume web services wh...
Marco Alberti, Federico Chesani, Marco Gavanelli, ...