Sciweavers

1625 search results - page 81 / 325
» Intentionality
Sort
View
HICSS
2007
IEEE
104views Biometrics» more  HICSS 2007»
14 years 3 months ago
Employees' Behavior towards IS Security Policy Compliance
The literature agrees that the major threat to IS security is constituted by careless employees who do not comply with organizations’ IS security policies and procedures. To add...
Seppo Pahnila, Mikko T. Siponen, M. Adam Mahmood
ICCV
2007
IEEE
14 years 3 months ago
Pose and Gaze Estimation in Multi-camera Networks for Non-restrictive HCI
Multi-camera networks offer potentials for a variety of novel human-centric applications through provisioning of rich visual information. In this paper, face orientation analysis ...
Chung-Ching Chang, Chen Wu, Hamid K. Aghajan
MOBIQUITOUS
2007
IEEE
14 years 3 months ago
On Adjusting Power to Defend Wireless Networks from Jamming
— Wireless networks are susceptible to accidental or intentional radio interference. One way to cope with this threat is to have the radios compete with the jammer, whereby the n...
Wenyuan Xu
ROMAN
2007
IEEE
110views Robotics» more  ROMAN 2007»
14 years 3 months ago
Does Disturbance Discourage People from Communicating with a Robot?
— We suggest that people’s responses to a robot of which attention starts to be distracted show whether they accept the robot as an intentional communication partner or not. Hu...
Claudia Muhl, Yukie Nagai
ARGMAS
2007
Springer
14 years 3 months ago
Defeasible Argumentation Support for an Extended BDI Architecture
Abstract. In this work, an agent architecture that combines defeasible argumentation and the BDI model is described. Argumentation will be used as a mechanism for reasoning about b...
Nicolás D. Rotstein, Alejandro Javier Garc&...