Sciweavers

1860 search results - page 137 / 372
» Structured Multimedia Authoring
Sort
View
ISCAS
2006
IEEE
163views Hardware» more  ISCAS 2006»
15 years 10 months ago
ASIC hardware implementation of the IDEA NXT encryption algorithm
— Symmetric-key block ciphers are often used to provide data confidentiality with low complexity, especially in the case of dedicated hardware implementations. IDEA NXT is a nov...
Marco Macchetti, Wenyu Chen
AVBPA
2005
Springer
248views Biometrics» more  AVBPA 2005»
15 years 10 months ago
A New On-Line Model Quality Evaluation Method for Speaker Verification
The accurate selection of the utterances is very important to obtain right estimated speaker models in speaker verification. In this sense, it is important to determine the quality...
Javier R. Saeta, Javier Hernando
MM
2004
ACM
84views Multimedia» more  MM 2004»
15 years 10 months ago
Tools used while developing auracle: a voice-controlled networked instrument
Auracle is a networked sound instrument controlled by the voice. Users jam together over the Internet using only a microphone. Throughout the development process, the authors expe...
Kristjan Varnik, Jason Freeman, Chandrasekhar Rama...
129
Voted
CANDC
2007
ACM
15 years 8 months ago
Eco-visualization: combining art and technology to reduce energy consumption
Can creative visualizations of real time energy consumption patterns trigger more ecologically responsible behavior? Media art that displays the real time usage of key resources s...
Tiffany Holmes
IADIS
2003
15 years 5 months ago
A Multimodal Interface for Digital Talking Books
This paper presents a framework for the production of digital talking books. These books target primarily the visually impaired community, but users with other characteristics can...
Carlos Duarte, Teresa Chambel, Luís Carri&c...