Sciweavers

5722 search results - page 958 / 1145
» Security Function Interactions
Sort
View
116
Voted
PETRA
2009
ACM
15 years 10 months ago
Design and prototype of a device to engage cognitively disabled older adults in visual artwork
We investigate technological solutions for arts therapists who work with older adults with cognitive disabilities, such as Alzheimer’s disease. We present ethnographic analysis ...
Scott Blunsden, Brandi Richards, Jennifer Boger, A...
166
Voted
CDC
2008
IEEE
187views Control Systems» more  CDC 2008»
15 years 10 months ago
Controlled random access MAC for network utility maximization in wireless networks
— There has been much recent interest in protocol design for wireless networks based on maximizing a network utility function. A significant advance in recent years is the obser...
Robert J. McCabe, Nikolaos M. Freris, P. R. Kumar
FGCN
2008
IEEE
170views Communications» more  FGCN 2008»
15 years 10 months ago
NetTopo: Beyond Simulator and Visualizer for Wireless Sensor Networks
Simulators are needed for testing algorithms of wireless sensor networks (WSNs) for large scale scenarios. Deploying real WSN testbed provides a more realistic testing environment...
Lei Shu, Chun Wu, Yan Zhang, Jiming Chen, Lei Wang...
158
Voted
ICAS
2008
IEEE
200views Robotics» more  ICAS 2008»
15 years 10 months ago
Connectivity of Thetis, a Distributed Hybrid Simulator, with a Mixed Control Architecture
—The purpose of this paper is to present the linkage of Thetis (a real time multi-vehicles hybrid simulator for heterogeneous vehicles) with a control architecture for the manage...
Olivier Parodi, Abdellah El Jalaoui, David Andreu
140
Voted
IROS
2008
IEEE
258views Robotics» more  IROS 2008»
15 years 10 months ago
3D active appearance model for aligning faces in 2D images
Abstract— Perceiving human faces is one of the most important functions for human robot interaction. The active appearance model (AAM) is a statistical approach that models the s...
Chun-Wei Chen, Chieh-Chih Wang