Sciweavers

372 search results - page 67 / 75
» Software Agents and User Autonomy
Sort
View
SAC
2002
ACM
13 years 7 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
PSYCHNOLOGY
2010
116views more  PSYCHNOLOGY 2010»
13 years 6 months ago
Social and Spatial Presence: An Application to Optimize Human-Computer Interaction
This study provides a framework for researchers who study human-computer interaction to develop and evaluate user-centric user-interfaces by applying existing theories about telep...
Karl Horvath, Matthew Lombard
ICWL
2005
Springer
14 years 1 months ago
Grounding Collaborative Knowledge Building in Semantics-Based Critiquing
In this paper we investigate the use of Latent Semantic Analysis (LSA), Critiquing Systems, and Knowledge Building to support computerbased teaching of English composition. We have...
Anders I. Mørch, William K. Cheung, Kelvin ...
LAWEB
2009
IEEE
14 years 2 months ago
Policy Based Protection and Personalized Generation of Web Content
Abstract—The World Wide Web offers easy sharing of information, but provides only few options for the protection of sensitive information and other sensitive resources. Tradition...
Sergej Zerr, Daniel Olmedilla, Juri Luca De Coi, W...
WOWMOM
2005
ACM
126views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
Personalized Service Composition for Ubiquitous Multimedia Delivery
Digital multimedia has gained popularity due to the huge success of the Internet. Users acquire and disseminate multimedia information using different types of devices and communi...
Swaroop Kalasapur, Mohan Kumar, Behrooz Shirazi