Sciweavers

1527 search results - page 146 / 306
» What About Wednesday
Sort
View
IVA
2001
Springer
14 years 1 months ago
Autonomous Avatars? From Users to Agents and Back
We describe the architecture of an interactive, “believable” agent with personality, called user agent, which can act on behalf of a user in various multi-user game contexts, w...
Matthias Scheutz, Brigitte Römmer
ICPR
2000
IEEE
14 years 1 months ago
Knowledge Based Fingerprint Image Enhancement
Fingerprint enhancement is a critical step in fingerprint identification. Most of the existing enhancement algorithms are based on local ridge direction. The main drawback of thes...
Xiping Luo, Jie Tian
ISORC
2000
IEEE
14 years 1 months ago
Structural and Behavioral Decomposition in Object Oriented Models
The decomposition of large systems into parts is a general principle of software design. Even more, in the scope of distributed systems a partition of the whole system into distri...
Joachim Fischer, Eckhardt Holz, Birger Møll...
IWSSD
2000
IEEE
14 years 1 months ago
Model Checking Implicit-Invocation Systems
While implicit invocation (publish-subscribe) systems have goodengineering properties, they are difficult toreason about and to test. Model checking such systems is an attractive...
David Garlan, Serge Khersonsky
WETICE
2000
IEEE
14 years 1 months ago
A Review of Groupware Evaluations
A better understanding of how groupware systems have been evaluated in the past can help to frame the discussion of what methods and techniques should be considered for future eva...
David Pinelle, Carl Gutwin