454 research outputs found

    Come, see and experience affective interactive art

    Get PDF
    The progress in the field of affective computing enables the realization of affective consumer products, affective games, and affective art. This paper describes the affective interactive art system Mood Swings, which interprets and visualizes affect expressed by a person. Mood Swings is founded on the integration of a framework for affective movements and a color model. This enables Mood Swings to recognize affective movement characteristics as expressed by a person and display a color that matches the expressed emotion. With that, a unique interactive system is introduced, which can be considered as art, a game, or a combination of both

    Agent-supported cooperative learning environments

    Get PDF
    We survey our research on (3D) virtual environments inhabited by agents that help visitors to get information and to get a tusk done. The main ideas and designs can be tuned to different applications, including information und transaction services (e-commerce), collaborative work and educational domains

    Jacob: An Educational Agent in a Virtual Environment

    Get PDF
    The Jacob Project involves the construction of a virtual environment where an animated human-like agent called Jacob gives instruction to the user. The project focuses on three issues: the software engineering aspects of building a virtual reality system, the integration of natural language interaction and other interaction modalities, and the use of agent technology. Jacob has been given a task model and an instruction model in order to teach a particular task. The results of the project can be generalized so that the agent can be used to instruct other tasks in other virtual environments

    A Mobile Ambients-based Approach for Network Attack Modelling and Simulation

    Get PDF
    Attack Graphs are an important support for assessment and subsequent improvement of network security. They reveal possible paths an attacker can take to break through security perimeters and traverse a network to reach valuable assets deep inside the network. Although scalability is no longer the main issue, Attack Graphs still have some problems that make them less useful in practice. First, Attack Graphs remain difficult to relate to the network topology. Second, Attack Graphs traditionally only consider the exploitation of vulnerable hosts. Third, Attack Graphs do not rely on automatic identification of potential attack targets. We address these gaps in our MsAMS (Multi-step Attack Modelling and Simulation) tool, based on Mobile Ambients. The tool not only allows the modelling of more static aspects of the network, such as the network topology, but also the dynamics of network attacks. In addition to Mobile Ambients, we use the PageRank algorithm to determine targets and hub scores produced by the HITS (Hypertext Induced Topic Search) algorithm to guide the simulation of an attacker searching for targets

    A Mobile Ambients-based Approach for Network Attack Modelling and Simulation

    Get PDF
    Attack Graphs are an important support for assessment and subsequent improvement of network security. They reveal possible paths an attacker can take to break through security perimeters and traverse a network to reach valuable assets deep inside the network. Although scalability is no longer the main issue, Attack Graphs still have some problems that make them less useful in practice. First, Attack Graphs remain difficult to relate to the network topology. Second, Attack Graphs traditionally only consider the exploitation of vulnerable hosts. Third, Attack Graphs do not rely on automatic identification of potential attack targets. We address these gaps in our MsAMS (Multi-step Attack Modelling and Simulation) tool, based on Mobile Ambients. The tool not only allows the modelling of more static aspects of the network, such as the network topology, but also the dynamics of network attacks. In addition to Mobile Ambients, we use the PageRank algorithm to determine targets and hub scores produced by the HITS (Hypertext Induced Topic Search) algorithm to guide the simulation of an attacker searching for targets

    Report on the first Twente Data Management Workshop on XML Databases and Information Retrieval

    Get PDF
    The Database Group of the University of Twente initiated a new series of workshops called Twente Data Management workshops (TDM), starting with one on XML Databases and Information Retrieval which took place on 21 June 2004 at the University of Twente. We have set ourselves two goals for the workshop series: i) To provide a forum to share original ideas as well as research results on data management problems; ii) To bring together researchers from the database community and researchers from related research fields

    The E-health Strategic Research Orientation at the Centre for Telematics and Information Technology

    Get PDF
    This report gives an overview of research themes, research groups and research partners of the E-Health Strategic Research Orientation (SRO) at the University of Twente

    Social Intelligence Design for Mediated Communication

    Get PDF
    Without abstract

    Towards Simulating Humans in Augmented Multi-party Interaction

    Get PDF
    Human-computer interaction requires modeling of the user. A user profile typically contains preferences, interests, characteristics, and interaction behavior. However, in its multimodal interaction with a smart environment the user displays characteristics that show how the user, not necessarily consciously, verbally and nonverbally provides the smart environment with useful input and feedback. Especially in ambient intelligence environments we encounter situations where the environment supports interaction between the environment, smart objects (e.g., mobile robots, smart furniture) and human participants in the environment. Therefore it is useful for the profile to contain a physical representation of the user obtained by multi-modal capturing techniques. We discuss the modeling and simulation of interacting participants in the European AMI research project
    • ā€¦
    corecore