Sciweavers

7395 search results - page 1473 / 1479
» Social Modeling and i*
Sort
View
JAIR
2010
160views more  JAIR 2010»
13 years 5 months ago
Reasoning About the Transfer of Control
We present DCL-PC: a logic for reasoning about how the abilities of agents and coalitions of agents are altered by transferring control from one agent to another. The logical foun...
Wiebe van der Hoek, Dirk Walther, Michael Wooldrid...
VR
2008
IEEE
233views Virtual Reality» more  VR 2008»
13 years 5 months ago
Cutting, Deforming and Painting of 3D meshes in a Two Handed Viso-haptic VR System
We describe M4, the multi-modal mesh manipulation system, which aims to provide a more intuitive desktop interface for freeform manipulation of 3D meshes. The system combines inte...
Adam Faeth, Michael Oren, Jonathan Sheller, Sean G...
PVLDB
2010
128views more  PVLDB 2010»
13 years 5 months ago
Update Rewriting and Integrity Constraint Maintenance in a Schema Evolution Support System: PRISM++
Supporting legacy applications when the database schema evolves represents a long-standing challenge of practical and theoretical importance. Recent work has produced algorithms a...
Carlo Curino, Hyun Jin Moon, Alin Deutsch, Carlo Z...
ACSAC
2010
IEEE
13 years 5 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
CONEXT
2010
ACM
13 years 5 months ago
NEVERMIND, the problem is already fixed: proactively detecting and troubleshooting customer DSL problems
Traditional DSL troubleshooting solutions are reactive, relying mainly on customers to report problems, and tend to be labor-intensive, time consuming, prone to incorrect resoluti...
Yu Jin, Nick G. Duffield, Alexandre Gerber, Patric...
« Prev « First page 1473 / 1479 Last » Next »