Sciweavers

758 search results - page 62 / 152
» User Control over User Adaptation: A Case Study
Sort
View
114
Voted
AAI
2010
147views more  AAI 2010»
15 years 3 months ago
Maintaining engagement in Long-Term Interventions with Relational Agents
We discuss issues in designing virtual humans for applications which require long-term voluntary use, and the problem of maintaining engagement with users over time. Concepts and t...
Timothy W. Bickmore, Daniel Schulman, Langxuan Yin
123
Voted
ICAT
2007
IEEE
15 years 9 months ago
Presentation Technique of Scent to Avoid Olfactory Adaptation
Trials on the transmission of olfactory information together with audio/visual information are currently being conducted in the field of multimedia. However, continuous emission ...
Ami Kadowaki, Junta Sato, Yuichi Bannai, Ken-ichi ...
MOBIMEDIA
2007
15 years 4 months ago
Adaptive link layer protocols for shared wireless links
— The error prone nature of wireless links often necessitates the use of a link layer protocol to ensure acceptable application performance. While traditional link layers assume ...
George Xylomenos, Michael Makidis
115
Voted
MONET
2008
129views more  MONET 2008»
15 years 1 months ago
Link Layer Adaptation for Shared Wireless Links
While traditional link layer protocols assume that they fully control the underlying link, in contemporary wireless networks the link may be dynamically shared by sessions belongin...
George Xylomenos, Michael Makidis
ISI
2006
Springer
15 years 3 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu