This paper discusses our recent studies on Embodied Conversational Agent (ECA) design strategies to encourage credible and trustworthy dialogue. We approach the problem from two specific directions: the embodiment tha...
详细信息
Situational information can enrich the interactions between a user and the services they wish to utilize. Such information encompasses details about the user, the physical environment and the computing resources. Ther...
Situational information can enrich the interactions between a user and the services they wish to utilize. Such information encompasses details about the user, the physical environment and the computing resources. There are at least three key aspects in addressing this issue. Firstly, it is important to accurately capture or infer the requirements of the users in a timely fashion. Without precise information on what the users are hoping to achieve it is difficult to identify suitable services or sub-services that may fulfill (in part or fully) their information needs. Secondly, the nature of the available services determines the modes in which they may be adapted to the users' needs. Rigid, inflexible services may be difficult to tune to the information requirements of the users. Adaptive services, on the other hand, are well suited to dynamically modifying their behavior, within defined constraints. The third issue to be addressed is the on-the-fly combination of services to meet the users' requirements. This paper argues that current modeling (both of users and services) techniques, adaptive axes and personalization techniques used in current personalized information services, such as Adaptive Hypermedia Systems, may supply the basis for next generation adaptive collaborative services.
In this paper, a new moving objects database model - Discrete Spatio-Temporal Trajectory Based Moving Objects database (DSTTMOD) model, is put forward. Trajectories are used to represent dynamic attributes of moving o...
详细信息
In recent years, a number of countries have introduced plans for national electronic patient record (EPR) systems. This paper argues that, in the near future, both patients and healthcare stakeholders will be able to ...
详细信息
In recent years, a number of countries have introduced plans for national electronic patient record (EPR) systems. This paper argues that, in the near future, both patients and healthcare stakeholders will be able to access medical records from WWW-based EPR systems. We contend that the primary impediment to the successful implementation and widespread uptake of the EPR concept is the fact that current healthcare information security (HIS) applications are not sufficiently robust. This paper identifies two main Information Security technologies: 1) Public key infrastructure (PKI) and 2) Biometrics that hold a lot of promise in a healthcare context. The key contribution of this paper is to propose a novel multi-layered HIS framework based on a combination of PKI, Smartcard and Biometrics technologies. We argue that this new HIS framework could assist healthcare institutions to provide a truly secure infrastructure for the electronic transmission of clinical data in the future. This paper also makes a case for the creation of a new nodal HIS body because existing information security bodies like the Forum of Incident Response and Security Teams are for general-purpose organizations and not specifically suited for the healthcare sector.
This paper presents our experiments on continuous audiovisual speech recognition. A number of bimodal systems using feature fusion or fusion within Hidden Markov Models are implemented. Experiments with different fusi...
详细信息
This paper presents our experiments on continuous audiovisual speech recognition. A number of bimodal systems using feature fusion or fusion within Hidden Markov Models are implemented. Experiments with different fusion techniques and their results are presented. Further the performance levels of the bimodal system and a unimodal speech recognizer under noisy conditions are compared.
This paper presents a security incident data model. The model uses many of the existing security incident taxonomies to organise its security incident related information. Where characteristic of incidents is not cove...
详细信息
The issues relating to security have wider scope than the technical details of computer system structure. In larger organisations the security problems become more complex since there are more requirements for data ac...
详细信息
ISBN:
(纸本)9729805067
The issues relating to security have wider scope than the technical details of computer system structure. In larger organisations the security problems become more complex since there are more requirements for data access management. The information associated with security management needs to be well organised. In this paper we present the first step in creating an Enterprise IT Security data Model. The aim of this research is to create a model that is able to capture the information needed by the security management in the provision of adequate security for an Enterprise.
Delft University of Technology there is a project running on multimodal interfaces on the interaction of speech and lipreading. A large vocabulary speaker independent speech recognizer for the Dutch language was devel...
详细信息
Speech technology is rapidly developing and has improved a lot over the last few years. Nevertheless, speech-enabled applications have not yet become mainstream software. Furthermore, there is a lack of proven design ...
详细信息
暂无评论