Sciweavers

141 search results - page 8 / 29
» What Do You Prefer
Sort
View
LREC
2008
118views Education» more  LREC 2008»
13 years 8 months ago
What would you Ask a conversational Agent? Observations of Human-Agent Dialogues in a Museum Setting
Embodied Conversational Agents have typically been constructed for use in limited domain applications, and tested in very specialized environments. Only in recent years have there...
Susan Robinson, David R. Traum, Midhun Ittycheriah...
EATCS
2000
85views more  EATCS 2000»
13 years 6 months ago
A New Zero-One Law and Strong Extension Axioms
One of the previous articles in this column was devoted to the zero-one laws for a number of logics playing prominent role in finite model theory: first-order logic FO, the extens...
Andreas Blass, Yuri Gurevich
ECSA
2010
Springer
13 years 6 months ago
Formal approach to security metrics.: what does "more secure" mean for you?
Security metrics are the tools for providing correct and upto-date information about a state of security. This information is essential for managing security efficiently. Although...
Leanid Krautsevich, Fabio Martinelli, Artsiom Yaut...
IUI
2009
ACM
14 years 3 months ago
Have a say over what you see: evaluating interactive compression techniques
We all encounter many documents on a daily basis that we do not have time to process in their entirety. Nevertheless, we lack good tools to rapidly skim and identify key informati...
Simon Tucker, Steve Whittaker
IAT
2010
IEEE
13 years 4 months ago
Getting What You Pay For: Is Exploration in Distributed Hill Climbing Really Worth it?
Abstract--The Distributed Stochastic Algorithm (DSA), Distributed Breakout Algorithm (DBA), and variations such as Distributed Simulated Annealing (DSAN), MGM-1, and DisPeL, are di...
Melanie Smith, Roger Mailler