Sciweavers

1625 search results - page 84 / 325
» Intentionality
Sort
View
HICSS
2005
IEEE
83views Biometrics» more  HICSS 2005»
14 years 2 months ago
Predicting the Usage of P2P Sharing Software: The Role of Trust and Perceived Risk
Peer-to-Peer, or P2P sharing has gone through fast growth in recent years and drawn the interests of Information Systems (IS) researchers. However, there is a lack of empirical st...
Heng Xu, Hao Wang, Hock-Hai Teo
GW
2005
Springer
141views Biometrics» more  GW 2005»
14 years 2 months ago
From Acoustic Cues to an Expressive Agent
This work proposes a new way for providing feedback to expressivity in music performance. Starting from studies on the expressivity of music performance we developed a system in wh...
Maurizio Mancini, Roberto Bresin, Catherine Pelach...
IFIP
2005
Springer
14 years 2 months ago
A Logic for Analysing Subterfuge in Delegation Chains
Abstract. Trust Management is an approach to construct and interpret the trust relationships among public-keys that are used to mediate security-critical actions. Cryptographic cre...
Hongbin Zhou, Simon N. Foley
IVA
2005
Springer
14 years 2 months ago
An Objective Character Believability Evaluation Procedure for Multi-agent Story Generation Systems
Abstract. The ability to generate narrative is of importance to computer systems that wish to use story effectively for entertainment, training, or education. One of the focuses of...
Mark O. Riedl, R. Michael Young
NMR
2004
Springer
14 years 2 months ago
Belief dynamics and defeasible argumentation in rational agents
The BDI model provides what it is possibly one of the most promising architectures for the development of intelligent agents, and has become one of the most studied and well known...
Marcelo A. Falappa, Alejandro Javier García...