Sciweavers

552 search results - page 58 / 111
» Recognizing Action at a Distance
Sort
View
ICAC
2005
IEEE
14 years 2 months ago
The Case for Automated Planning in Autonomic Computing
Computing systems have become so complex that the IT industry recognizes the necessity of deliberative methods to make these systems self-configuring, self-healing, selfoptimizin...
Biplav Srivastava, Subbarao Kambhampati
ICALP
2005
Springer
14 years 2 months ago
Probabilistic Polynomial-Time Semantics for a Protocol Security Logic
Abstract. We describe a cryptographically sound formal logic for proving protocol security properties without explicitly reasoning about probability, asymptotic complexity, or the ...
Anupam Datta, Ante Derek, John C. Mitchell, Vitaly...
AMDO
2006
Springer
14 years 21 days ago
Ballistic Hand Movements
Common movements like reaching, striking, etc. observed during surveillance have highly variable target locations. This puts appearance-based techniques at a disadvantage for model...
Shiv Naga Prasad Vitaladevuni, Vili Kellokumpu, La...
ICMCS
2000
IEEE
126views Multimedia» more  ICMCS 2000»
14 years 17 days ago
Interactive Artificial Life based on Behavior and Perception in a Virtual Environment
A cyber-character is a kind of artificial life inhabiting a virtual world. To be a life form in the virtual world, cyber characters need sensors and control systems. The sensor sy...
Hyun Seung Yang, Hyun-jin Park, Yong-Jin Cho
COLING
1996
13 years 10 months ago
A Unified Theory of Irony and Its Computational Formalization
This paper presents a unified theory of verbal irony tbr developing a computational model of irony. The theory claims that an ironic utterance implicitly communicates the fact tha...
Akira Utsumi