Sciweavers

8760 search results - page 1671 / 1752
» Modeling users of intelligent systems
Sort
View
FORTE
2004
15 years 5 months ago
Localizing Program Errors for Cimple Debugging
Abstract. We present automated techniques for the explanation of counterexamples, where a counter-example should be understood as a sequence of program statements. Our approach is ...
Samik Basu, Diptikalyan Saha, Scott A. Smolka
152
Voted
ICISC
2004
147views Cryptology» more  ICISC 2004»
15 years 5 months ago
Batch Verifications with ID-Based Signatures
An identity (ID)-based signature scheme allows any pair of users to verify each other's signatures without exchanging public key certificates. With the advent of Bilinear maps...
HyoJin Yoon, Jung Hee Cheon, Yongdae Kim
PDPTA
2000
15 years 5 months ago
On the application of accelerating simulation methods in network analysis
When evaluating quantitative aspects of communication networks using simulation, one of the main difficulties to face is the often considerable computing power required. In some s...
José Incera, Gerardo Rubino, Nicolás...
AVI
1996
15 years 5 months ago
A visual interface for synchronous collaboration and negotiated transactions
: This paper introduces a visual interface for computer-supported cooperative work (CSCW). The interface is an extension of the editor interface of ESCHER, a prototype database sys...
Lutz Michael Wegner, Manfred Paul 0002, Jens Thamm...
130
Voted
JUCS
2007
133views more  JUCS 2007»
15 years 4 months ago
Building Immersive Conversation Environment Using Locomotive Interactive Character
: Generating composite human motion such as locomotion and gestures is important for interactive applications, such as interactive storytelling and computer games. In interactive s...
Rai Chan, Junichi Hoshino
« Prev « First page 1671 / 1752 Last » Next »