Results: 1-25 | 26-50 | 51-75 | 76-100 | >>
Results: 1-25/454

Authors: Dautenhahn, K
Citation: K. Dautenhahn, Socially intelligent agents - The human in the loop, IEEE SYST A, 31(5), 2001, pp. 345-348

Authors: Persson, P Laaksolahti, J Lonnqvist, P
Citation: P. Persson et al., Understanding socially intelligent agents - A multilayered phenomenon, IEEE SYST A, 31(5), 2001, pp. 349-360

Authors: Paiva, A Machado, I Prada, R
Citation: A. Paiva et al., The child behind the character, IEEE SYST A, 31(5), 2001, pp. 361-368

Authors: Ye, YM Boies, S Huang, PY Tsotsos, JK
Citation: Ym. Ye et al., Agents-supported adaptive group awareness: Smart distance and WWWaware, IEEE SYST A, 31(5), 2001, pp. 369-380

Authors: Hogg, LMJ Jennings, NR
Citation: Lmj. Hogg et Nr. Jennings, Socially intelligent reasoning for autonomous agents, IEEE SYST A, 31(5), 2001, pp. 381-393

Authors: McBreen, HM Jack, MA
Citation: Hm. Mcbreen et Ma. Jack, Evaluating humanoid synthetic agents in e-retail applications, IEEE SYST A, 31(5), 2001, pp. 394-405

Authors: Falcone, R Castelfranchi, C
Citation: R. Falcone et C. Castelfranchi, The human in the loop of a delegated agent: The theory of adjustable social autonomy, IEEE SYST A, 31(5), 2001, pp. 406-418

Authors: Nicolescu, MN Mataric, MJ
Citation: Mn. Nicolescu et Mj. Mataric, Learning and interacting in human-robot domains, IEEE SYST A, 31(5), 2001, pp. 419-430

Authors: Andry, P Gaussier, P Moga, S Banquet, JP Nadel, J
Citation: P. Andry et al., Learning and communication via imitation: An autonomous robot perspective, IEEE SYST A, 31(5), 2001, pp. 431-442

Authors: Breazeal, C Edsinger, A Fitzpatrick, P Scassellati, B
Citation: C. Breazeal et al., Active vision for sociable robots, IEEE SYST A, 31(5), 2001, pp. 443-453

Authors: Canamero, L Fredslund, J
Citation: L. Canamero et J. Fredslund, I show you how I like you - Can you read it in my face?, IEEE SYST A, 31(5), 2001, pp. 454-459

Authors: Wilson, M Neal, M
Citation: M. Wilson et M. Neal, Diminishing returns of engineering effort in telerobotic systems, IEEE SYST A, 31(5), 2001, pp. 459-465

Authors: Prendinger, H Ishizuka, M
Citation: H. Prendinger et M. Ishizuka, Let's talk! Socially intelligent agents for language conversation training, IEEE SYST A, 31(5), 2001, pp. 465-471

Authors: Marin, JA Brown, DE James, JR
Citation: Ja. Marin et al., Protecting the network: Research directions in information assurance, IEEE SYST A, 31(4), 2001, pp. 249-252

Authors: Guan, Y Fu, XW Xuan, D Shenoy, PU Bettati, R Zhao, W
Citation: Y. Guan et al., NetCamo: Camouflaging network traffic for QoS-guaranteed mission critical applications, IEEE SYST A, 31(4), 2001, pp. 253-265

Authors: Ye, N Li, XY Chen, Q Emran, SM Xu, MM
Citation: N. Ye et al., Probabilistic techniques for intrusion detection based on computer audit data, IEEE SYST A, 31(4), 2001, pp. 266-274

Authors: Cunningham, RK Lippmann, RP Webster, SE
Citation: Rk. Cunningham et al., Detecting and displaying novel computer attacks with macroscope, IEEE SYST A, 31(4), 2001, pp. 275-281

Authors: Xiong, Y Liu, S Sun, P
Citation: Y. Xiong et al., On the defense of the distributed denial of service attacks: An on-off feedback control approach, IEEE SYST A, 31(4), 2001, pp. 282-293

Authors: Lee, SC Heinbuch, DV
Citation: Sc. Lee et Dv. Heinbuch, Training a neural-network based intrusion detector to recognize novel attacks, IEEE SYST A, 31(4), 2001, pp. 294-299

Authors: Lala, C Panda, B
Citation: C. Lala et B. Panda, Evaluating damage from cyber attacks: A model and analysis, IEEE SYST A, 31(4), 2001, pp. 300-310

Authors: Brown, DE Gunderson, LF
Citation: De. Brown et Lf. Gunderson, Using clustering to discover the preferences of computer criminals, IEEE SYST A, 31(4), 2001, pp. 311-318

Authors: Birman, KP
Citation: Kp. Birman, Technology challenges for virtual overlay networks, IEEE SYST A, 31(4), 2001, pp. 319-327

Authors: Nash, DA Ragsdale, DJ
Citation: Da. Nash et Dj. Ragsdale, Simulation of self-similarity in network utilization patterns as a precursor to automated testing of intrusion detection systems, IEEE SYST A, 31(4), 2001, pp. 327-331

Authors: Kewley, DL Bouchard, JF
Citation: Dl. Kewley et Jf. Bouchard, DARPA information assurance program dynamic defense experiment summary, IEEE SYST A, 31(4), 2001, pp. 331-336

Authors: Wiederhold, G
Citation: G. Wiederhold, Collaboration requirements: A point of failure in protecting information, IEEE SYST A, 31(4), 2001, pp. 336-342
Risultati: 1-25 | 26-50 | 51-75 | 76-100 | >>