Now showing items 31-40 of 2670
What were we all looking at? Identifying objects of collective visual attention
(Taylor & Francis, 2015)
We aim to identify the salient objects in an image by applying a model of visual attention. We automate the process by predicting those objects in an image that are most likely to be the focus of someone’s visual attention. ...
A definition of abstraction.
(John Wiley, 2005-07-13)
What does it mean to say that one program is "more abstract" than another? What is "abstract" about an abstract data type? What is the difference between a "high-level" program and a "low-level" program? In this paper we ...
Gazing into a Second Life: Gaze-driven adventures, control barriers, and the need for disability privacy in an online virtual world.
Online virtual worlds such as Second Life and World of Warcraft offer users the chance to participate in potentially limitless virtual worlds, all via a standard desktop pc, mouse and keyboard. This paper addresses some ...
Responsible innovation across borders: tensions, paradoxes and possibilities
In March 2014 a group of early career researchers and academics from São Paulo state and from the UK met at the University of Campinas to participate in a workshop on ‘Responsible Innovation and the Governance of Socially ...
Integrating structured OO approaches with formal techniques for the development of real-time systems
The use of formal methods in the development of time-critical applications is essential if we want to achieve a high level of assurance in them. However, these methods have not yet been widely accepted in industry as ...
Compositional modelling: The formal perspective
We provide a formal framework within which an Information System (IS) could be modelled, analysed, and verified in a compositional manner. Our work is based on Interval Temporal Logic (ITL) and its programming language ...
Performance Modelling and Evaluation of Enterprise Information Security Technologies
By providing effective access control mechanisms, enterprise information security technologies have been proven successful in protecting the confidentiality of sensitive information in business organizations. However, such ...
Derivation of data intensive algorithms by formal transformation: the Schorr-Waite graph marking algorithm
In this paper we consider a particular class of algorithms which present certain difficulties to formal verification. These are algorithms which use a single data structure for two or more purposes, which combine program ...
Knowledge versus content in e-learning: A philosophical discussion.