Sciweavers

13180 search results - page 2302 / 2636
» Network Models
Sort
View
VW
1998
Springer
157views Virtual Reality» more  VW 1998»
15 years 9 months ago
Real Face Communication in a Virtual World
This paper describes an efficient method to make an individual face for animation from several possible inputs and how to use this result for a realistic talking head communication...
Won-Sook Lee, Elwin Lee, Nadia Magnenat-Thalmann
ICCAD
1996
IEEE
151views Hardware» more  ICCAD 1996»
15 years 9 months ago
Expected current distributions for CMOS circuits
The analysis of CMOS VLSI circuit switching current has become an increasingly important and difficult task from both a VLSI design and simulation software perspective. This paper...
Dennis J. Ciplickas, Ronald A. Rohrer
ICRA
1994
IEEE
100views Robotics» more  ICRA 1994»
15 years 8 months ago
SM2 for New Space Station Structure: Autonomous Locomotion and Teleoperation Control
The Self-Mobile Space Manipulator (SM2) has evolved to adapt to the new pre-integrated I-beam structure of the Space Station Freedom (SSF). In this paper, we first briefly overvie...
Michael C. Nechyba, Yangsheng Xu
ACMSE
2009
ACM
15 years 8 months ago
Towards policy driven self-configuration of user-centric communication
The convergence of various multimedia communications that includes voice, video and data presents many opportunities for enabling unified communication but paradoxically leads to ...
Paola Boettner, Mansi Gupta, Yali Wu, Andrew A. Al...
GLOBECOM
2009
IEEE
15 years 8 months ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
« Prev « First page 2302 / 2636 Last » Next »