Sciweavers

1036 search results - page 169 / 208
» Report on INEX 2009
Sort
View
HOST
2009
IEEE
14 years 7 months ago
Experiences in Hardware Trojan Design and Implementation
Abstract-- We report our experiences in designing and implementing several hardware Trojans within the framework of the Embedded System Challenge competition that was held as part ...
Yier Jin, Nathan Kupp, Yiorgos Makris
HRI
2009
ACM
14 years 7 months ago
I would choose the other card: humanoid robot gives an advice
This article reports on a user study conducted to asses the credibility of a humanoid robot. The study set-up was based on the "Monty Hall Problem". Overall 13 people be...
Astrid Weiss, Roland Buchner, Thomas Scherndl, Man...
ICASSP
2009
IEEE
14 years 7 months ago
Spoken language interpretation: On the use of dynamic Bayesian networks for semantic composition
In the context of spoken language interpretation, this paper introduces a stochastic approach to infer and compose semantic structures. Semantic frame structures are directly deri...
Marie-Jean Meurs, Fabrice Lefevre, Renato de Mori
ICC
2009
IEEE
130views Communications» more  ICC 2009»
14 years 7 months ago
Verification of Secret Key Generation from UWB Channel Observations
Theoretical models of ultrawideband (UWB) radio channels indicate that pairs of UWB radio transceivers measure their common radio channel with a high degree of agreement and third ...
Masoud Ghoreishi Madiseh, Shuai He, Michael L. McG...
ICDAR
2009
IEEE
14 years 7 months ago
Two-stage Approach for Word-wise Script Identification
A two-stage approach for word-wise identification of English (Roman), Devnagari and Bengali (Bangla) scripts is proposed. This approach balances the tradeoff between recognition a...
Sukalpa Chanda, Srikanta Pal, Katrin Franke, Umapa...