Compelling synthetic characters must behave in ways that reflect their past experience and thus allow for individual personalization. We therefore need a method that allows charac...
Song-Yee Yoon, Robert C. Burke, Bruce Blumberg, Ge...
As the complexity of Internet is scaled up, it is likely for the Internet resources to be exposed to Distributed Denial of Service (DDoS) flooding attacks on TCP-based Web servers....
Persons with disabilities are often marginalised from economy and society due to the lack of access to disability related information and services. Through the use of assistive te...
Louis Coetzee, Guillaume J.-L. Olivrin, Ilse Vivie...
Security proponents heavily emphasize the importance of choosing a strong password (one with high entropy). Unfortunately, by design, most humans are apparently incapable of gener...
Researchers in the ontology-design field have developed the content for ontologies in many domain areas. Recently, ontologies have become increasingly common on the WorldWide Web ...