Sciweavers

2373 search results - page 373 / 475
» Modelling Facial Behaviours
Sort
View
BPM
2005
Springer
117views Business» more  BPM 2005»
15 years 9 months ago
Interoperability in Service-Based Communities
Interoperability is a multifaceted problem caused by issues surpassing those of technological incompatibilities. The real interoperability challenges are stemming from various sour...
Toni Ruokolainen, Lea Kutvonen
CAV
2005
Springer
144views Hardware» more  CAV 2005»
15 years 9 months ago
Romeo: A Tool for Analyzing Time Petri Nets
In this paper, we present the features of Romeo, a Time Petri Net (TPN) analyzer. The tool Romeo allows state space computation of TPN and on-the-fly model-checking of reachabilit...
Guillaume Gardey, Didier Lime, Morgan Magnin, Oliv...
CCIA
2005
Springer
15 years 9 months ago
Acquiring Unobtrusive Relevance Feedback through Eye-Tracking in Ambient Recommender Systems
Acquiring relevant information to keep user’s preferences up-to-date is crucial in recommender systems in order to close the cycle of recommendations. Ambient Intelligence is a s...
Gustavo González, Beatriz López, Cec...
CONTEXT
2005
Springer
15 years 9 months ago
Impact of the signal control strategy on red light running
This article concerns red-light running at intersections and deals with the impact of different types of control strategies. Red running occurrences at red onset are observed throu...
Sophie Midenet
PKC
2005
Springer
192views Cryptology» more  PKC 2005»
15 years 9 months ago
Securing RSA-KEM via the AES
RSA-KEM is a popular key encapsulation mechanism that combines the RSA trapdoor permutation with a key derivation function (KDF). Often the details of the KDF are viewed as orthogo...
Jakob Jonsson, Matthew J. B. Robshaw