Sciweavers

1566 search results - page 246 / 314
» Contification Using Dominators
Sort
View
HICSS
2008
IEEE
122views Biometrics» more  HICSS 2008»
15 years 8 months ago
A Meta-theory for Understanding IS in Socio-technical Systems
Information systems (IS) research often attempts to examine and explain how technology leads to outcomes through usage of information technology (IT). Although extensive research ...
Dominic M. Thomas, Saurabh Gupta, Robert P. Bostro...
ICASSP
2008
IEEE
15 years 8 months ago
Human perception of synthetic character emotions in the presence of conflicting and congruent vocal and facial expressions
Audio-visual emotion expression by synthetic agents is widely employed in research, industrial, and commercial applications. However, the mechanism through which people judge the ...
Emily Mower, Sungbok Lee, Maja J. Mataric, Shrikan...
ICDCS
2008
IEEE
15 years 8 months ago
On the Impact of Mobile Hosts in Peer-to-Peer Data Networks
Peer-to-peer (P2P) data networks dominate Internet traffic. In this work, we study the problems that arise when mobile hosts participate in P2P networks. We primarily focus on th...
Zhenyun Zhuang, Sandeep Kakumanu, Yeonsik Jeong, R...
ICMCS
2008
IEEE
146views Multimedia» more  ICMCS 2008»
15 years 8 months ago
Joint-processing of audio-visual signals in human perception of conflicting synthetic character emotions
Expressive audio-visual synthetic characters are increasingly employed in research and commercial applications. However, the mechanism that people employ to interpret conflicting...
Emily Mower, Sungbok Lee, Maja J. Mataric, Shrikan...
ICPR
2008
IEEE
15 years 8 months ago
Multiscale competitive code for efficient palmprint recognition
Coding-based method, which encodes the responses of a bank of filters into bitwise features, has been very successful in palmprint representation and matching. Palmprints, however...
Wangmeng Zuo, Feng Yue, Kuanquan Wang, David Zhang