Sciweavers

1239 search results - page 159 / 248
» Generating Web Applications from Use Case Scenarios
Sort
View
INDOCRYPT
2005
Springer
15 years 9 months ago
Attack the Dragon
1 Dragon is a word oriented stream cipher submitted to the ECRYPT project, it operates on key sizes of 128 and 256 bits. The original idea of the design is to use a nonlinear feedb...
Håkan Englund, Alexander Maximov
GI
2009
Springer
15 years 1 months ago
A Framework for Multiple Radar and Multiple 2D/3D Camera Fusion
Abstract: In this paper we present a framework for the fusion of radar and image information. In the case considered here we combine information from multiple closerange radars to ...
Marek Schikora, Benedikt Romba
FBT
1997
15 years 4 months ago
Rapid Prototyping with AutoFocus
Abstract: In most cases, it is simple inconvenience of use that keeps formal methods from being put to industrial use. This paper argues that functionalities, even though of simple...
Franz Huber, Bernhard Schätz
135
Voted
IUI
2004
ACM
15 years 8 months ago
FAIM: integrating automated facial affect analysis in instant messaging
One of the limitations in traditional instant messaging platforms is that they predominantly rely on text messages as the primary form of expression. This paper presents FAIM, an ...
Rana El Kaliouby, Peter Robinson
137
Voted
DAGM
2003
Springer
15 years 8 months ago
Improving Children's Speech Recognition by HMM Interpolation with an Adults' Speech Recognizer
In this paper we address the problem of building a good speech recognizer if there is only a small amount of training data available. The acoustic models can be improved by interpo...
Stefan Steidl, Georg Stemmer, Christian Hacker, El...