Sciweavers

376 search results - page 22 / 76
» Teaching context in information security
Sort
View
HCI
2009
13 years 5 months ago
Optimal Affective Conditions for Subconscious Learning in a 3D Intelligent Tutoring System
In this paper we take a closer and in-depth look at initial results obtained from a previous novel experiment conducted with a 3D subliminal teaching Intelligent Tutoring System. S...
Pierre Chalfoun, Claude Frasson
AGENTS
2001
Springer
14 years 14 days ago
Tears and fears: modeling emotions and emotional behaviors in synthetic agents
Emotions play a critical role in creating engaging and believable characters to populate virtual worlds. Our goal is to create general computational models to support characters t...
Jonathan Gratch, Stacy Marsella
CSFW
2010
IEEE
13 years 12 months ago
Information Flow in Credential Systems
—This paper proposes a systematic study of information flow in credential-based declarative authorization policies. It argues that a treatment in terms of information flow is n...
Moritz Y. Becker
IPAW
2010
13 years 5 months ago
Securing Provenance-Based Audits
Given the significant increase of on-line services that require personal information from users, the risk that such information is misused has become an important concern. In such ...
Rocío Aldeco-Pérez, Luc Moreau
CAISE
2006
Springer
13 years 11 months ago
Goal-oriented Analysis of Regulations
This paper explains how goal-oriented requirements engineering can be transposed into regulation modelling. It motivates also why this way of modelling regulations is worthwhile fo...
Robert Darimont, Michel Lemoine