Sciweavers

1407 search results - page 211 / 282
» Systems Theory Model for Information Security
Sort
View
WPES
2003
ACM
14 years 2 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
IVA
2007
Springer
14 years 3 months ago
Incorporating Emotion Regulation into Virtual Stories
This paper presents an approach to incorporate emotion regulation as addressed within psychology literature into virtual characters. To this end, first Gross’ informal theory of ...
Tibor Bosse, Matthijs Pontier, Ghazanfar F. Siddiq...
ICIP
2005
IEEE
14 years 2 months ago
Using Tsallis entropy into a Bayesian network for CBIR
This paper presents a Bayesian Network model for ContentBased Image Retrieval (CBIR). In the explanation and test of this work, only two images features (semantic evidences) are i...
Paulo S. Rodrigues, Gilson A. Giraldi, Ade A. Arau...
ICLP
2003
Springer
14 years 2 months ago
Concurrency, Time, and Constraints
Concurrent constraint programming (ccp) is a model of concurrency for systems in which agents (also called processes) interact with one another by telling and asking information in...
Frank D. Valencia
COGCOM
2010
107views more  COGCOM 2010»
13 years 6 months ago
Where to Look Next? Combining Static and Dynamic Proto-objects in a TVA-based Model of Visual Attention
To decide ``Where to look next ?'' is a central function of the attention system of humans, animals and robots. Control of attention depends on three factors, that is, lo...
Marco Wischnewski, Anna Belardinelli, Werner X. Sc...