Sciweavers

15888 search results - page 2934 / 3178
» Supporting human-intensive systems
Sort
View
135
Voted
ACSAC
1998
IEEE
15 years 8 months ago
Application-Level Isolation to Cope with Malicious Database Users
System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore us...
Sushil Jajodia, Peng Liu, Catherine D. McCollum
139
Voted
MMB
1999
Springer
249views Communications» more  MMB 1999»
15 years 8 months ago
A Development Platform for the Design and Optimization of Mobile Radio Networks
The rapidly increasing traffic demand from mobile users forces network operators and service providers to extend and optimize existing networks as well as to plan entirely new mo...
Jürgen Deissner, Gerhard Fettweis, Jörg ...
ROBOCUP
1999
Springer
113views Robotics» more  ROBOCUP 1999»
15 years 8 months ago
11Monkeys Description
The major purpose of our research is to study cooperative planning for multi-agent system in time-critical environment. The RoboCup simulator league is the most interesting target ...
Shuhei Kinoshita, Yoshikazu Yamamoto
AGENTS
1998
Springer
15 years 8 months ago
Cognition and Affect: Architectures and Tools
Which agent architectures are capable of justifying descriptions in terms of the `higher level' mental concepts applicable to human beings? We propose a new kind of architect...
Aaron Sloman, Brian Logan
172
Voted
SIGGRAPH
1998
ACM
15 years 8 months ago
A Beam Tracing Approach to Acoustic Modeling for Interactive Virtual Environments
Virtual environment research has focused on interactive image generation and has largely ignored acoustic modeling for spatialization of sound. Yet, realistic auditory cues can co...
Thomas A. Funkhouser, Ingrid Carlbom, Gary Elko, G...
« Prev « First page 2934 / 3178 Last » Next »