Sciweavers

758 search results - page 62 / 152
» User Control over User Adaptation: A Case Study
Sort
View
AAI
2010
147views more  AAI 2010»
13 years 9 months ago
Maintaining engagement in Long-Term Interventions with Relational Agents
We discuss issues in designing virtual humans for applications which require long-term voluntary use, and the problem of maintaining engagement with users over time. Concepts and t...
Timothy W. Bickmore, Daniel Schulman, Langxuan Yin
ICAT
2007
IEEE
14 years 3 months ago
Presentation Technique of Scent to Avoid Olfactory Adaptation
Trials on the transmission of olfactory information together with audio/visual information are currently being conducted in the field of multimedia. However, continuous emission ...
Ami Kadowaki, Junta Sato, Yuichi Bannai, Ken-ichi ...
MOBIMEDIA
2007
13 years 10 months ago
Adaptive link layer protocols for shared wireless links
— The error prone nature of wireless links often necessitates the use of a link layer protocol to ensure acceptable application performance. While traditional link layers assume ...
George Xylomenos, Michael Makidis
MONET
2008
129views more  MONET 2008»
13 years 7 months ago
Link Layer Adaptation for Shared Wireless Links
While traditional link layer protocols assume that they fully control the underlying link, in contemporary wireless networks the link may be dynamically shared by sessions belongin...
George Xylomenos, Michael Makidis
ISI
2006
Springer
13 years 9 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu