Sciweavers

108 search results - page 3 / 22
» The strength of non-size increasing computation
Sort
View
ACL
2012
11 years 7 months ago
INPRO_iSS: A Component for Just-In-Time Incremental Speech Synthesis
We present a component for incremental speech synthesis (iSS) and a set of applications that demonstrate its capabilities. This component can be used to increase the responsivity ...
Timo Baumann, David Schlangen
CCS
2006
ACM
13 years 9 months ago
Secure information sharing enabled by Trusted Computing and PEI models
The central goal of secure information sharing is to "share but protect" where the motivation to "protect" is to safeguard the sensitive content from unauthori...
Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang
NIPS
2007
13 years 6 months ago
Congruence between model and human attention reveals unique signatures of critical visual events
Current computational models of bottom-up and top-down components of attention are predictive of eye movements across a range of stimuli and of simple, fixed visual tasks (such a...
Robert J. Peters, Laurent Itti
ICIP
2008
IEEE
13 years 11 months ago
A novel video encryption technique based on secret sharing
The rapid growth of the Internet and digitized content made video distribution simpler. Hence the need for video data protection is on the rise. In this paper, we propose a secure...
Chigullapally Narsimha Raju, Ganugula Umadevi, Kan...
CASES
2000
ACM
13 years 9 months ago
PROMPT: a mapping environment for telecom applications on "system-on-a-chip"
Increasing of computation needs and improving of processor integration make the mapping of embedded real-time applications more and more expensive. PROMPT [1] provides a new appro...
Michel Barreteau, Juliette Mattioli, Thierry Grand...