Sciweavers

2034 search results - page 244 / 407
» Declarative Agent Control
Sort
View
115
Voted
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
15 years 8 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
92
Voted
LREC
2010
146views Education» more  LREC 2010»
15 years 4 months ago
Annotation of Human Gesture using 3D Skeleton Controls
The manual transcription of human gesture behavior from video for linguistic analysis is a work-intensive process that results in a rather coarse description of the original motio...
Quan Nguyen, Michael Kipp
91
Voted
LREC
2010
178views Education» more  LREC 2010»
15 years 4 months ago
Building a System for Emotions Detection from Speech to Control an Affective Avatar
In this paper we describe a corpus set together from two sub-corpora. The CINEMO corpus contains acted emotional expression obtained by playing dubbing exercises. This new protoco...
Mátyás Brendel, Riccardo Zaccarelli,...
135
Voted
ICMAS
1998
15 years 4 months ago
Implementation Issues on Market-Based QoS Control
In this paper, we discuss two major tradeoffs, spatial and temporal tradeoffs, that appear when applying marketbased computing to multimedia network applications. The former appea...
Hirofumi Yamaki, Yutaka Yamauchi, Toru Ishida
CL
2010
Springer
15 years 2 months ago
Isolating untrusted software extensions by custom scoping rules
In a modern programming language, scoping rules determine the visibility of names in various regions of a program [15]. In this work, we examine the idea of allowing an applicatio...
Philip W. L. Fong, Simon A. Orr