Sciweavers

2399 search results - page 421 / 480
» Avatar Information Extraction System
Sort
View
WPES
2006
ACM
15 years 10 months ago
A study on the value of location privacy
This paper introduces results of a study into the value of location privacy for individuals using mobile devices. We questioned a sample of over 1200 people from five EU countrie...
Daniel Cvrcek, Marek Kumpost, Vashek Matyas, Georg...
DFT
2005
IEEE
89views VLSI» more  DFT 2005»
15 years 9 months ago
On-Line Identification of Faults in Fault-Tolerant Imagers
Detection of defective pixels that develop on-line is a vital part of fault tolerant schemes for repairing imagers during operation. This paper presents a new algorithm for the id...
Glenn H. Chapman, Israel Koren, Zahava Koren, Jozs...
ICMCS
2005
IEEE
116views Multimedia» more  ICMCS 2005»
15 years 9 months ago
Video Object Boundary Reconstruction by 2-Pass Voting
In this paper we propose a voting-based object boundary reconstruction approach. Tensor voting has been studied by many people recently, and it can be used for boundary estimation...
Like Zhang, Qi Tian, Nicu Sebe, Jingsheng Ma
173
Voted
ICRA
2005
IEEE
173views Robotics» more  ICRA 2005»
15 years 9 months ago
Decision Networks for Repair Strategies in Speech-Based Interaction with Mobile Tour-Guide Robots
– The main task of a voice-enabled tour-guide robot in mass exhibition setting is to engage visitors in dialogue and provide as much exhibit information as possible in a limited ...
Plamen J. Prodanov, Andrzej Drygajlo
NCA
2005
IEEE
15 years 9 months ago
Providing Hard Real-Time Guarantees in Context-Aware Applications: Challenges and Requirements
Context-aware applications rely on the ability to perceive the state of the surrounding environment. In this paper, we address a class of such applications where real-time guarant...
Malika Boulkenafed, Barbara Hughes, René Me...