Sciweavers

341 search results - page 50 / 69
» Permeability Analysis based on information granulation theor...
Sort
View
HICSS
2006
IEEE
115views Biometrics» more  HICSS 2006»
15 years 3 months ago
Enterprise Architecture Implementation and Management: A Case Study on Interoperability
The focus of this study is to explore why public agencies implement enterprise architecture programs and the interoperability challenges they are faced with when governing these p...
Kristian Hjort-Madsen
IJSC
2008
161views more  IJSC 2008»
14 years 9 months ago
Automatic Generation of Gaze and Gestures for Dialogues between Embodied Conversational Agents
In this paper we introduce a system that automatically adds different types of non-verbal behavior to a given dialogue script between two virtual embodied agents. It allows us to t...
Werner Breitfuss, Helmut Prendinger, Mitsuru Ishiz...
IJON
2007
117views more  IJON 2007»
14 years 9 months ago
Learning sensory representations with intrinsic plasticity
Intrinsic plasticity (IP) refers to a neuron’s ability to regulate its firing activity by adapting its intrinsic excitability. Previously, we showed that model neurons combinin...
Nicholas Butko, Jochen Triesch
CODES
2003
IEEE
15 years 3 months ago
Schedule-aware performance estimation of communication architecture for efficient design space exploration
In this paper, we are concerned about the performance estimation of bus-based architectures assuming that the task partitioning on the processing components is already determined....
Sungchan Kim, Chaeseok Im, Soonhoi Ha
ACMICEC
2006
ACM
117views ECommerce» more  ACMICEC 2006»
15 years 1 months ago
Practical secrecy-preserving, verifiably correct and trustworthy auctions
We present a practical protocol based on homomorphic cryptography for conducting provably fair sealed-bid auctions. The system preserves the secrecy of the bids, even after the an...
David C. Parkes, Michael O. Rabin, Stuart M. Shieb...