Sciweavers

2261 search results - page 341 / 453
» Dynamic types for authentication
Sort
View
ICMCS
2006
IEEE
101views Multimedia» more  ICMCS 2006»
14 years 3 months ago
Emotional Speech Synthesis using Subspace Constraints in Prosody
An efficient speech synthesis method that uses subspace constraint in prosody is proposed. Conventional unit selection methods concatenate speech segments stored in database, tha...
Shinya Mori, Tsuyoshi Moriyama, Shinji Ozawa
ICMCS
2006
IEEE
149views Multimedia» more  ICMCS 2006»
14 years 3 months ago
Improved Graphical Model for Audiovisual Object Tracking
Object tracking plays an important role in multimedia surveillance systems, in which the major types of data are video and audio captured by cameras and microphone arrays. In this...
Hao Tang, Thomas S. Huang
ICPADS
2006
IEEE
14 years 3 months ago
On-line Evolutionary Resource Matching for Job Scheduling in Heterogeneous Grid Environments
In this paper, we describe a resource matcher (RM) developed for the on-line resource matching in heterogeneous grid environments. RM is based on the principles of Evolutionary Al...
Vijay K. Naik, Pawel Garbacki, Krishna Kummamuru, ...
ICRA
2006
IEEE
143views Robotics» more  ICRA 2006»
14 years 3 months ago
Evaluation of a Large Scale Pervasive Embedded Network for Robot Path Planning
— We investigate a technique that uses an embedded network deployed pervasively throughout an environment to aid robots in navigation. First, we show that the path computed by th...
Keith J. O'Hara, Victor Bigio, Shaun Whitt, Daniel...
IJCNN
2006
IEEE
14 years 3 months ago
Online Training of a Generalized Neuron with Particle Swarm Optimization
— Neural networks are used in a wide number of fields including signal and image processing, modeling and control and pattern recognition. Some of the most common type of neural ...
Raveesh Kiran, Sandhya R. Jetti, Ganesh K. Venayag...