Sciweavers

9210 search results - page 1610 / 1842
» Analyzing Real-Time Systems
Sort
View
IPM
2007
139views more  IPM 2007»
15 years 2 months ago
A semantic Bayesian network approach to retrieving information with intelligent conversational agents
As access to information becomes more intensive in society, a great deal of that information is becoming available through diverse channels. Accordingly, users require effective ...
Kyoung Min Kim, Jin-Hyuk Hong, Sung-Bae Cho
TCSV
2008
161views more  TCSV 2008»
15 years 2 months ago
Dynamic Facial Expression Analysis and Synthesis With MPEG-4 Facial Animation Parameters
This paper describes a probabilistic framework for faithful reproduction of dynamic facial expressions on a synthetic face model with MPEG-4 facial animation parameters (FAPs) whil...
Yongmian Zhang, Qiang Ji, Zhiwei Zhu, Beifang Yi
ISCI
2007
134views more  ISCI 2007»
15 years 2 months ago
A location-aware multicasting protocol for Bluetooth Location Networks
Bluetooth Location Network (BLN) is a Bluetooth radio network that is composed of some mobile Bluetooth devices and static Bluetooth units, and is established at the system initia...
Chih-Yung Chang, Kuei-Ping Shih, Chung-Hsien Hsu, ...
TIP
2008
85views more  TIP 2008»
15 years 2 months ago
Resource Allocation for Error Resilient Video Coding Over AWGN Using Optimization Approach
The number of slices for error resilient video coding is jointly optimized with 802.11a-like media access control and the physical layers with automatic repeat request and rate com...
Cheolhong An, Truong Q. Nguyen
TISSEC
2008
106views more  TISSEC 2008»
15 years 2 months ago
On predictive models and user-drawn graphical passwords
In commonplace text-based password schemes, users typically choose passwords that are easy to recall, exhibit patterns, and are thus vulnerable to brute-force dictionary attacks. ...
Paul C. van Oorschot, Julie Thorpe
« Prev « First page 1610 / 1842 Last » Next »