Sciweavers

9575 search results - page 1742 / 1915
» Exploring user experience in
Sort
View
ICASSP
2010
IEEE
13 years 9 months ago
HMM-based separation of acoustic transfer function for single-channel sound source localization
This paper presents a sound source (talker) localization method using only a single microphone, where a HMM (Hidden Markov Model) of clean speech is introduced to estimate the aco...
Ryoichi Takashima, Tetsuya Takiguchi, Yasuo Ariki
CGA
2008
13 years 9 months ago
Depth-of-Field Blur Effects for First-Person Navigation in Virtual Environments
This paper studies the use of visual blur effects, i.e., blurring of parts of the image fed back to the user, for First-Person-Navigations in Virtual Environments (VE). First, we ...
Sébastien Hillaire, Anatole Lécuyer,...
CORR
2010
Springer
149views Education» more  CORR 2010»
13 years 9 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh
CORR
2010
Springer
124views Education» more  CORR 2010»
13 years 9 months ago
Link Graph Analysis for Adult Images Classification
In order to protect an image search engine's users from undesirable results adult images' classifier should be built. The information about links from websites to images...
Evgeny Kharitonov, Anton Slesarev, Ilya Muchnik, F...

Publication
164views
13 years 9 months ago
Kangaroo: Video Seeking in P2P Systems
A key challenge faced by peer-to-peer(P2P) video-on- demand (VoD) systems is their ability, or lack thereof, to provide DVD-like functionality, such as pause, forward and backward ...
Xiaoyuan Yang, Minas Gjoka, Parminder Chhabra, Ath...
« Prev « First page 1742 / 1915 Last » Next »