Sciweavers

1775 search results - page 71 / 355
» Antichains on Three Levels
Sort
View
DATE
2009
IEEE
162views Hardware» more  DATE 2009»
15 years 4 months ago
Aelite: A flit-synchronous Network on Chip with composable and predictable services
Abstract—To accommodate the growing number of applications integrated on a single chip, Networks on Chip (NoC) must offer scalability not only on the architectural, but also on t...
Andreas Hansson, Mahesh Subburaman, Kees Goossens
110
Voted
IEEEIAS
2009
IEEE
15 years 4 months ago
Network Security Situation Awareness Using Exponential and Logarithmic Analysis
: Network security situation awareness (NSSA) is a hotspot in the network security research field, and it’s the perception, comprehension, and forecast of network security situat...
Xiaobin Tan, Qin Guihong, Zhang Yong, Liang Ping
ICB
2009
Springer
202views Biometrics» more  ICB 2009»
15 years 4 months ago
Beyond Minutiae: A Fingerprint Individuality Model with Pattern, Ridge and Pore Features
Abstract. Fingerprints are considered to be unique because they contain various distinctive features, including minutiae, ridges, pores, etc. Some attempts have been made to model ...
Yi Chen, Anil K. Jain
ICMI
2009
Springer
106views Biometrics» more  ICMI 2009»
15 years 4 months ago
Towards adapting fantasy, curiosity and challenge in multimodal dialogue systems for preschoolers
We investigate how fantasy, curiosity and challenge contribute to the user experience in multimodal dialogue computer games for preschool children. For this purpose, an on-line mu...
Theofanis Kannetis, Alexandros Potamianos
VRST
2009
ACM
15 years 4 months ago
A semantic environment model for crowd simulation in multilayered complex environment
Simulating crowds in complex environment is fascinating and challenging, however, modeling of the environment is always neglected in the past, which is one of the essential proble...
Hao Jiang, Wenbin Xu, Tianlu Mao, Chunpeng Li, Shi...