Sciweavers

2337 search results - page 411 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
IUI
2004
ACM
14 years 1 months ago
Where to look: a study of human-robot engagement
This paper reports on a study of human subjects with a robot designed to mimic human conversational gaze behavior in collaborative conversation. The robot and the human subject to...
Candace L. Sidner, Cory D. Kidd, Christopher Lee, ...
IWPC
2003
IEEE
14 years 29 days ago
Understanding Change-Proneness in OO Software through Visualization
During software evolution, adaptive, and corrective maintenance are common reasons for changes. Often such changes cluster around key components. It is therefore important to anal...
James M. Bieman, Anneliese Amschler Andrews, Helen...
IWSOC
2003
IEEE
99views Hardware» more  IWSOC 2003»
14 years 29 days ago
Template Generation and Selection Algorithms
The availability of high-level design entry tooling is crucial for the viability of any reconfigurable SoC architecture. This paper presents a template generation method to extra...
Yuanqing Guo, Gerard J. M. Smit, Hajo Broersma, Pa...
WETICE
2003
IEEE
14 years 28 days ago
Coordination in Pervasive Computing Environments
Computer science and engineering nowadays appears to be challenged (and driven) by technological progress and quantitative growth. Among the technological progress challenges are ...
Alois Ferscha
VDB
1998
275views Database» more  VDB 1998»
13 years 9 months ago
Building Metaphors for Supporting User Interaction with Multimedia Databases
In this paper we discuss how metaphors for supporting user interaction with multimedia databases can be automatically generated. The work presented is a further step in the develo...
Maria Francesca Costabile, Donato Malerba, Matthia...