Sciweavers

112 search results - page 16 / 23
» Learning the Semantics of Manipulation Action
Sort
View
IUI
2010
ACM
14 years 2 months ago
Intelligent understanding of handwritten geometry theorem proving
Computer-based geometry systems have been widely used for teaching and learning, but largely based on mouse-andkeyboard interaction, these systems usually require users to draw fi...
Yingying Jiang, Feng Tian, Hongan Wang, Xiaolong Z...
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
13 years 7 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
PUC
2000
107views more  PUC 2000»
13 years 7 months ago
Implicit Human Computer Interaction Through Context
In this paper the term implicit human computer interaction is defined. It is discussed how the availability of processing power and advanced sensing technology can enable a shift ...
Albrecht Schmidt
PLDI
2005
ACM
14 years 1 months ago
Composing security policies with polymer
We introduce a language and system that supports definition and composition of complex run-time security policies for Java applications. Our policies are comprised of two sorts o...
Lujo Bauer, Jay Ligatti, David Walker
PKDD
2009
Springer
102views Data Mining» more  PKDD 2009»
14 years 2 months ago
Relevance Grounding for Planning in Relational Domains
Probabilistic relational models are an efficient way to learn and represent the dynamics in realistic environments consisting of many objects. Autonomous intelligent agents that gr...
Tobias Lang, Marc Toussaint