Sciweavers

264 search results - page 43 / 53
» A Robust Synchronizer
Sort
View
ICMI
2007
Springer
160views Biometrics» more  ICMI 2007»
14 years 2 months ago
Using the influence model to recognize functional roles in meetings
In this paper, an influence model is used to recognize functional roles played during meetings. Previous works on the same corpus demonstrated a high recognition accuracy using SV...
Wen Dong, Bruno Lepri, Alessandro Cappelletti, Ale...
DSN
2006
IEEE
14 years 2 months ago
Static Analysis to Enforce Safe Value Flow in Embedded Control Systems
Embedded control systems consist of multiple components with different criticality levels interacting with each other. For example, in a passenger jet, the navigation system inter...
Sumant Kowshik, Grigore Rosu, Lui Sha
LOCA
2005
Springer
14 years 2 months ago
Context Modelling and Management in Ambient-Aware Pervasive Environments
Services in pervasive computing systems must evolve so that they become minimally intrusive and exhibit inherent proactiveness and dynamic adaptability to the current conditions, u...
Maria Strimpakou, Ioanna Roussaki, Carsten Pils, M...
WDAG
2004
Springer
103views Algorithms» more  WDAG 2004»
14 years 1 months ago
Relationships Between Broadcast and Shared Memory in Reliable Anonymous Distributed Systems
We study the power of reliable anonymous distributed systems, where processes do not fail, do not have identifiers, and run identical programmes. We are interested specifically i...
James Aspnes, Faith Ellen Fich, Eric Ruppert
3DPVT
2004
IEEE
141views Visualization» more  3DPVT 2004»
14 years 10 days ago
Exploitation of 3D Images for Face Authentication Under Pose and Illumination Variations
An appearance-based face authentication system integrating 2D color or intensity images and 3D data is presented in this paper. The proposed system is based on a low-cost 3D and c...
Filareti Tsalakanidou, Sotiris Malassiotis, Michae...