Sciweavers

719 search results - page 53 / 144
» What HMMs Can Do
Sort
View
HICSS
2002
IEEE
90views Biometrics» more  HICSS 2002»
14 years 1 months ago
Legitimate by Design: Towards Trusted Virtual Community Environments
Legitimacy is a key part of the social requirements specification for a trusted virtual community environment (VCE). If an environment is not seen as legitimate, social conflicts m...
Brian Whitworth, Aldo de Moor
IUI
2000
ACM
14 years 1 months ago
SUITOR: an attentive information system
Attentive systems pay attention to what users do so that they can attend to what users need. Such systems track user behavior, model user interests, and anticipate user desires an...
Paul P. Maglio, Rob Barrett, Christopher S. Campbe...
AI50
2006
14 years 22 days ago
How to Build Consciousness into a Robot: The Sensorimotor Approach
The problem of consciousness has been divided by philosophers into the problem of Access Consciousness and the problem of Phenomenal Consciousness or "raw feel". In this ...
J. Kevin O'Regan
ICMI
2000
Springer
171views Biometrics» more  ICMI 2000»
14 years 17 days ago
Gaze and Speech in Attentive User Interfaces
The trend toward pervasive computing necessitates finding and implementing appropriate ways for users to interact with devices. We believe the future of interaction with pervasive ...
Paul P. Maglio, Teenie Matlock, Christopher S. Cam...
PRICAI
2000
Springer
14 years 16 days ago
Task Models, Intentions, and Agent Conversation Policies
It is possible to define conversation policies, such as communication or dialogue protocols, that are based strictly on what messages and, respectively, what performatives may foll...
Renee Elio, Afsaneh Haddadi, Ajit Singh