Sciweavers

5722 search results - page 970 / 1145
» Security Function Interactions
Sort
View
129
Voted
ICMCS
2005
IEEE
105views Multimedia» more  ICMCS 2005»
15 years 9 months ago
Audio-visual affect recognition in activation-evaluation space
The ability of a computer to detect and appropriately respond to changes in a user’s affective state has significant implications to Human-Computer Interaction (HCI). To more ac...
Zhihong Zeng, ZhenQiu Zhang, Brian Pianfetti, Jili...
ICRA
2005
IEEE
102views Robotics» more  ICRA 2005»
15 years 9 months ago
Hand Force Estimation using Electromyography Signals
— In many studies and applications that include direct human involvement such as human-robot interaction, control of prosthetic arms, and human factor studies, hand force is need...
Farid Mobasser, Keyvan Hashtrudi-Zaad
126
Voted
SMI
2005
IEEE
15 years 9 months ago
Volumetric Data Analysis using Morse-Smale Complexes
The 3D Morse-Smale complex is a fundamental topological construct that partitions the domain of a real-valued function into regions having uniform gradient flow behavior. In this...
Vijay Natarajan, Valerio Pascucci
ANCS
2005
ACM
15 years 9 months ago
Gigabit routing on a software-exposed tiled-microprocessor
This paper investigates the suitability of emerging tiled-architectures, equipped with low-latency on-chip networks, for high-performance network routing. In this paper, we presen...
Umar Saif, James W. Anderson, Anthony Degangi, Ana...
149
Voted
IUI
2005
ACM
15 years 9 months ago
Metafor: visualizing stories as code
Every program tells a story. Programming, then, is the art of constructing a story about the objects in the program and what they do in various situations. So-called programming l...
Hugo Liu, Henry Lieberman