Sciweavers

385 search results - page 68 / 77
» Perturbation Analysis with Qualitative Models
Sort
View
HICSS
2006
IEEE
124views Biometrics» more  HICSS 2006»
14 years 1 months ago
Gatekeeping in Virtual Communities: On Politics of Power in Cyberspace
Gatekeeping/Information Control is exercised frequently and daily in virtual communities. Gatekeeping exists in four different levels: Regulators, service providers, communitiesâ€...
Karine Barzilai-Nahon
CAIP
2005
Springer
194views Image Analysis» more  CAIP 2005»
14 years 1 months ago
Comparative Study of 3D Face Acquisition Techniques
Today, communication devices are evolving towards friendly–user interactivity while permanently eyeing towards 3D display technologies. As such, 3D face generation, modelling an...
Mark Chan, Patrice Delmas, Georgy L. Gimel'farb, P...
SPW
1999
Springer
14 years 3 days ago
Performance of Protocols
This paper presents a comprehensive study on the performance of common MANET (mobile ad hoc network) routing protocols under realistic network scenarios. The routing protocols use...
Michael Roe
KDD
2000
ACM
114views Data Mining» more  KDD 2000»
13 years 11 months ago
Learning Prosodic Patterns for Mandarin Speech Synthesis
Higher quality synthesized speech is required for widespread use of text-to-speech (TTS) technology, and prosodic pattern is the key feature that makes synthetic speech sound unna...
Yiqiang Chen, Wen Gao, Tingshao Zhu
MA
2000
Springer
114views Communications» more  MA 2000»
13 years 11 months ago
Saving Energy and Providing Value Added Services in Intelligent Buildings: A MAS Approach
In a de-regulated market the distribution utilities will compete with added value for the customer in addition to the delivery of energy. We describe a system consisting of a colle...
Paul Davidsson, Magnus Boman