Sciweavers

1022 search results - page 85 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...
DSD
2010
IEEE
190views Hardware» more  DSD 2010»
14 years 10 months ago
Hardware-Based Speed Up of Face Recognition Towards Real-Time Performance
— Real-time face recognition by computer systems is required in many commercial and security applications because it is the only way to protect privacy and security in the sea of...
I. Sajid, Sotirios G. Ziavras, M. M. Ahmed
LREC
2010
151views Education» more  LREC 2010»
14 years 11 months ago
Towards Investigating Effective Affective Dialogue Strategies
We describe an experimental Wizard-of-Oz-setup for the integration of emotional strategies into spoken dialogue management. With this setup we seek to evaluate different approache...
Gregor Bertrand, Florian Nothdurft, Steffen Walter...
AVI
2004
14 years 11 months ago
Towards the next generation of 3D content creation
In this paper we present a novel integrated 3D editing environment that combines recent advantages in various fields of computer graphics, such as shape modelling, video-based Hum...
Gerhard H. Bendels, Ferenc Kahlesz, Reinhard Klein
SCOPES
2004
Springer
15 years 3 months ago
DSP Code Generation with Optimized Data Word-Length Selection
Digital signal processing applications are implemented in embedded systems with fixed-point arithmetic to minimize the cost and the power consumption. To reduce the application ti...
Daniel Menard, Olivier Sentieys