Sciweavers

1239 search results - page 202 / 248
» Techniques for the Design of Java Operating Systems
Sort
View
AAAI
2000
13 years 9 months ago
Interactive Training for Synthetic Characters
Compelling synthetic characters must behave in ways that reflect their past experience and thus allow for individual personalization. We therefore need a method that allows charac...
Song-Yee Yoon, Robert C. Burke, Bruce Blumberg, Ge...
AISS
2010
130views more  AISS 2010»
13 years 5 months ago
Neural Network Modeling for Proton Exchange Membrane Fuel Cell (PEMFC)
This paper presents the artificial intelligence techniques to control a proton exchange membrane fuel cell system process using particularly a methodology of dynamic neural networ...
Youssef M. ElSayed, Moataz H. Khalil, Khairia E. A...
RTSS
2008
IEEE
14 years 2 months ago
A Holistic Approach to Decentralized Structural Damage Localization Using Wireless Sensor Networks
Wireless sensor networks (WSNs) have become an increasingly compelling platform for Structural Health Monitoring (SHM) applications, since they can be installed relatively inexpen...
Gregory Hackmann, Fei Sun, Nestor Castaneda, Cheny...
GLOBECOM
2008
IEEE
14 years 2 months ago
Joint Channel and Mismatch Correction for OFDM Reception with Time-interleaved ADCs: Towards Mostly Digital MultiGigabit Transce
— Time-interleaved (TI) analog-to-digital converters (ADCs) are a promising architecture for realizing the highspeed ADCs required to implement “mostly digital” receivers for...
P. Sandeep, Upamanyu Madhow, Munkyo Seo, Mark J. W...
HICSS
2008
IEEE
211views Biometrics» more  HICSS 2008»
14 years 2 months ago
Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks
—In this paper, we propose a new user authentication (UA) scheme based on one-time password (OTP) protocol using smart cards for home networks. The proposed scheme is to authenti...
Jongpil Jeong, Min Young Chung, Hyunseung Choo