Sciweavers

92 search results - page 17 / 19
» Active Audition for Humanoid
Sort
View
98
Voted
DEBS
2003
ACM
15 years 7 months ago
Information sharing with the Oracle database
Database systems have been designed to manage business critical information and make this information accessible on request to connected clients. There is, however, an ever-increa...
Dieter Gawlick, Shailendra Mishra
EUROSSC
2008
Springer
15 years 3 months ago
Raising Awareness about Space via Vibro-Tactile Notifications
Human perception, in a world of continuous and seamless exposure to visual and auditory stimuli, is increasingly challenged to information overload. Among the primary human senses,...
Andreas Riener, Alois Ferscha
116
Voted
COMPSAC
2009
IEEE
14 years 11 months ago
Towards Call for Testing: An Application to User Acceptance Testing of Web Applications
1 The paper proposes a new test model, Call-For-Testing (CFT), and applies it to User Acceptance Testing (UAT) of Web Applications. Different from traditional approaches, UAT in th...
Lian Yu, Wei Zhao, Xiaofeng Di, Changzhu Kong, Wen...
114
Voted
ACSW
2006
15 years 3 months ago
Catching spam before it arrives: domain specific dynamic blacklists
1 The arrival of any piece of unsolicited and unwanted email (spam) into a user's email inbox is a problem. It results in real costs to organisations and possibly an increasin...
Duncan Cook, Jacky Hartnett, Kevin Manderson, Joel...
164
Voted
SECPERU
2006
IEEE
15 years 7 months ago
Detecting Critical Nodes for MANET Intrusion Detection Systems
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common d...
A. Karygiannis, E. Antonakakis, A. Apostolopoulos