Sciweavers

4650 search results - page 637 / 930
» Generating and evaluating evaluative arguments
Sort
View
DFT
2008
IEEE
120views VLSI» more  DFT 2008»
15 years 11 months ago
Built-in-Self-Diagnostics for a NoC-Based Reconfigurable IC for Dependable Beamforming Applications
Integrated circuits (IC) targeting at the streaming applications for tomorrow are becoming a fast growing market. Applications such as beamforming require mass computing capabilit...
Oscar Kuiken, Xiao Zhang, Hans G. Kerkhoff
FGR
2008
IEEE
301views Biometrics» more  FGR 2008»
15 years 11 months ago
3D facial geometry recovery via group-wise optical flow
We describe an algorithm for automatically finding correspondences from face video sequences. This method is useful to many applications such as face tracking, face modeling and ...
Hui Fang, Nicholas Costen, David Cristinacce, John...
HOST
2008
IEEE
15 years 11 months ago
IC Activation and User Authentication for Security-Sensitive Systems
—A number of applications depend on the protection of security-sensitive hardware, preventing unauthorized users from gaining access to the functionality of the integrated circui...
Jiawei Huang, John Lach
IAT
2008
IEEE
15 years 11 months ago
An Ontology-Driven Framework for Deploying JADE Agent Systems
Multi-agent systems have proven to be a powerful technology for building complex distributed applications. However, the process of designing, configuring and deploying agent-based...
Csongor Nyulas, Martin J. O'Connor, Samson W. Tu, ...
157
Voted
ICASSP
2008
IEEE
15 years 11 months ago
Phonetic pronunciations for arabic speech-to-text systems
In this paper two aspects of generating and using phonetic Arabic dictionaries are described. First, the use of single pronunciation acoustic models in the context of Arabic large...
Frank Diehl, Mark J. F. Gales, Marcus Tomalin, Phi...