Sciweavers

5220 search results - page 153 / 1044
» Changing Persistent Applications
Sort
View
HAPTICS
2010
IEEE
15 years 9 months ago
Basic Properties of Phantom Sensation for Practical Haptic Applications
Phantom sensation (PhS) is a pseudo-tactile sensation that occurs when two or more mechanical or electrical stimuli are presented simultaneously to the skin. PhS has two well-known...
Hiroshi Kato, Yuki Hashimoto, Hiroyuki Kajimoto
190
Voted
EUC
2008
Springer
15 years 6 months ago
An Improved Password-Based Authenticated Key Agreement Scheme for Pervasive Applications
Password authentication is a popular approach used for user authentication in pervasive computing environments due to its simplicity and convenience. To secure the transmission be...
Maw-Jinn Tsaur, Wei-Chi Ku, Hao-Rung Chung
133
Voted
LREC
2010
130views Education» more  LREC 2010»
15 years 6 months ago
Modified LTSE-VAD Algorithm for Applications Requiring Reduced Silence Frame Misclassification
The LTSE-VAD is one of the best known algorithms for voice activity detection. In this paper we present a modified version of this algorithm, that makes the VAD decision not takin...
Iker Luengo, Eva Navas, Igor Odriozola, Ibon Sarat...
139
Voted
HCI
2007
15 years 6 months ago
An Architecture for Adaptive and Adaptable Mobile Applications for Physically Handicapped People
Context-awareness is an important capability needed in devices in a ubiquitous computing environment. Ubiquitous computing devices use different types of sensors along with the us...
Matthias Betz, Mahmudul Huq, Volkmar Pipek, Markus...
151
Voted
SDM
2008
SIAM
206views Data Mining» more  SDM 2008»
15 years 6 months ago
Latent Variable Mining with Its Applications to Anomalous Behavior Detection
In this paper, we propose a new approach to anomaly detection by looking at the latent variable space to make the first step toward latent anomaly detection. Most conventional app...
Shunsuke Hirose, Kenji Yamanishi