Sciweavers

2846 search results - page 29 / 570
» Believe it or Not
Sort
View
ADS
2004
Springer
14 years 3 months ago
Data-Driven Tools for Designing Talking Heads Exploiting Emotional Attitudes
Abstract. Audio/visual speech, in the form of labial movement and facial expression data, was utilized in order to semi-automatically build a new Italian expressive and emotive tal...
Piero Cosi, Andrea Fusaro, Daniele Grigoletto, Gra...
CRYPTO
2004
Springer
154views Cryptology» more  CRYPTO 2004»
14 years 3 months ago
An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators
Abstract. In this paper we propose a new key recovery attack on irregular clocked keystream generators where the stream is filtered by a nonlinear Boolean function. We show that t...
Håvard Molland, Tor Helleseth
CIA
2001
Springer
14 years 2 months ago
Improving Communication in 3D Virtual Environments by Means of Task Delegation in Agents
User-to-User Communication within Internet-based 3D Virtual Environments is usually difficult mainly due to the trade-off between the capability and the complexity of the interface...
Ricardo Imbert, Angélica de Antonio, Javier...
PKC
1998
Springer
95views Cryptology» more  PKC 1998»
14 years 1 months ago
Overview of Elliptic Curve Cryptography
In this article, we look at the elliptic curve cryptography, which is believed to be one of the most promising candidates for the next generation cryptographic tool. The following ...
Kiyomichi Araki, Takakazu Satoh, Shinji Miura
FOCI
2007
IEEE
14 years 1 months ago
Type-2 Fuzzy Sets: Geometric Defuzzification and Type-Reduction
This paper presents the geometric defuzzifier for generalised type-2 fuzzy sets. This defuzzifier can be executed in real-time and can therefore be applied to control and other rea...
Simon Coupland