Sciweavers

92 search results - page 17 / 19
» Active Audition for Humanoid
Sort
View
DEBS
2003
ACM
15 years 2 months ago
Information sharing with the Oracle database
Database systems have been designed to manage business critical information and make this information accessible on request to connected clients. There is, however, an ever-increa...
Dieter Gawlick, Shailendra Mishra
95
Voted
EUROSSC
2008
Springer
14 years 11 months ago
Raising Awareness about Space via Vibro-Tactile Notifications
Human perception, in a world of continuous and seamless exposure to visual and auditory stimuli, is increasingly challenged to information overload. Among the primary human senses,...
Andreas Riener, Alois Ferscha
COMPSAC
2009
IEEE
14 years 7 months ago
Towards Call for Testing: An Application to User Acceptance Testing of Web Applications
1 The paper proposes a new test model, Call-For-Testing (CFT), and applies it to User Acceptance Testing (UAT) of Web Applications. Different from traditional approaches, UAT in th...
Lian Yu, Wei Zhao, Xiaofeng Di, Changzhu Kong, Wen...
ACSW
2006
14 years 11 months ago
Catching spam before it arrives: domain specific dynamic blacklists
1 The arrival of any piece of unsolicited and unwanted email (spam) into a user's email inbox is a problem. It results in real costs to organisations and possibly an increasin...
Duncan Cook, Jacky Hartnett, Kevin Manderson, Joel...
SECPERU
2006
IEEE
15 years 3 months ago
Detecting Critical Nodes for MANET Intrusion Detection Systems
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common d...
A. Karygiannis, E. Antonakakis, A. Apostolopoulos