Sciweavers

1641 search results - page 17 / 329
» Subject Composition by Roles
Sort
View
ICMI
2005
Springer
158views Biometrics» more  ICMI 2005»
14 years 27 days ago
Recognition of sign language subwords based on boosted hidden Markov models
Sign language recognition (SLR) plays an important role in human-computer interaction (HCI), especially for the convenient communication between deaf and hearing society. How to e...
Liang-Guo Zhang, Xilin Chen, Chunli Wang, Yiqiang ...
HICSS
2000
IEEE
136views Biometrics» more  HICSS 2000»
13 years 11 months ago
Agent-based Team Aiding in a Time Critical Task
In this paper we evaluate the effectiveness of agent-based aiding in support of a time-critical team-planning task for teams of both humans and heterogeneous software agents. The ...
Terry R. Payne, Terri L. Lenox, Susan Hahn, Michae...
ICFP
2008
ACM
14 years 7 months ago
Mixin' up the ML module system
ML modules provide hierarchical namespace management, as well as fine-grained control over the propagation of type information, but they do not allow modules to be broken up into ...
Derek Dreyer, Andreas Rossberg
ICSE
2007
IEEE-ACM
14 years 7 months ago
The Role of Experience and Ability in Comprehension Tasks Supported by UML Stereotypes
Proponents of design notations tailored for specific application domains or reference architectures, often available in the form of UML stereotypes, motivate them by improved unde...
Filippo Ricca, Massimiliano Di Penta, Marco Torchi...
CCS
2009
ACM
14 years 2 months ago
A probabilistic approach to hybrid role mining
Role mining algorithms address an important access control problem: configuring a role-based access control system. Given a direct assignment of users to permissions, role mining...
Mario Frank, Andreas P. Streich, David A. Basin, J...