Sciweavers

3555 search results - page 544 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
CA
2003
IEEE
15 years 9 months ago
Language-Driven Nonverbal Communication in a Bilingual Conversational Agent
This paper describes an animated conversational agent called Kare1 which integrates a talking head interface with a linguistically motivated human-machine dialogue system. The age...
Scott A. King, Alistair Knott, Brendan McCane
138
Voted
ADHOC
2005
84views more  ADHOC 2005»
15 years 4 months ago
Infrastructure-based MAC in wireless mobile ad-hoc networks
- The IEEE 802.11 standard is the most popular Medium Access Control (MAC) protocol for wireless local area networks. However, in an ad-hoc environment, the Point Coordination Func...
Hossam S. Hassanein, Tiantong You, Hussein T. Mouf...
CASES
2007
ACM
15 years 8 months ago
Performance optimal processor throttling under thermal constraints
We derive analytically, the performance optimal throttling curve for a processor under thermal constraints for a given task sequence. We found that keeping the chip temperature co...
Ravishankar Rao, Sarma B. K. Vrudhula
GIS
2005
ACM
16 years 5 months ago
Towards topological consistency and similarity of multiresolution geographical maps
Several application contexts require the ability to use together and compare different geographic datasets (maps) concerning the same or overlapping areas. This is for example the...
Alberto Belussi, Barbara Catania, Paola Podest&agr...
XPU
2007
Springer
15 years 10 months ago
Empirical Evidence Principle and Joint Engagement Practice to Introduce XP
Bringing software process change to an organisation is a real challenge. The authors have shown a sample attempt to carry out a process change and then reflected on its results and...
Lech Madeyski, Wojciech Biela