Sciweavers

9210 search results - page 1610 / 1842
» Analyzing Real-Time Systems
Sort
View
IPM
2007
139views more  IPM 2007»
13 years 10 months ago
A semantic Bayesian network approach to retrieving information with intelligent conversational agents
As access to information becomes more intensive in society, a great deal of that information is becoming available through diverse channels. Accordingly, users require effective ...
Kyoung Min Kim, Jin-Hyuk Hong, Sung-Bae Cho
TCSV
2008
161views more  TCSV 2008»
13 years 10 months ago
Dynamic Facial Expression Analysis and Synthesis With MPEG-4 Facial Animation Parameters
This paper describes a probabilistic framework for faithful reproduction of dynamic facial expressions on a synthetic face model with MPEG-4 facial animation parameters (FAPs) whil...
Yongmian Zhang, Qiang Ji, Zhiwei Zhu, Beifang Yi
ISCI
2007
134views more  ISCI 2007»
13 years 10 months ago
A location-aware multicasting protocol for Bluetooth Location Networks
Bluetooth Location Network (BLN) is a Bluetooth radio network that is composed of some mobile Bluetooth devices and static Bluetooth units, and is established at the system initia...
Chih-Yung Chang, Kuei-Ping Shih, Chung-Hsien Hsu, ...
TIP
2008
85views more  TIP 2008»
13 years 10 months ago
Resource Allocation for Error Resilient Video Coding Over AWGN Using Optimization Approach
The number of slices for error resilient video coding is jointly optimized with 802.11a-like media access control and the physical layers with automatic repeat request and rate com...
Cheolhong An, Truong Q. Nguyen
TISSEC
2008
106views more  TISSEC 2008»
13 years 10 months ago
On predictive models and user-drawn graphical passwords
In commonplace text-based password schemes, users typically choose passwords that are easy to recall, exhibit patterns, and are thus vulnerable to brute-force dictionary attacks. ...
Paul C. van Oorschot, Julie Thorpe
« Prev « First page 1610 / 1842 Last » Next »