Sciweavers

6952 search results - page 1344 / 1391
» The information integrity imperative
Sort
View
EXPCS
2007
13 years 12 months ago
The user in experimental computer systems research
Experimental computer systems research typically ignores the end-user, modeling him, if at all, in overly simple ways. We argue that this (1) results in inadequate performance eva...
Peter A. Dinda, Gokhan Memik, Robert P. Dick, Bin ...
COLCOM
2009
IEEE
13 years 12 months ago
An IT appliance for remote collaborative review of mechanisms of injury to children in motor vehicle crashes
This paper describes the architecture and implementation of a Java-based appliance for collaborative review of crashes involving injured children in order to determine mechanisms o...
Mahendra Kumar, Richard E. Newman, José For...
3DPVT
2004
IEEE
285views Visualization» more  3DPVT 2004»
13 years 12 months ago
Speech-Driven Face Synthesis from 3D Video
This paper presents a framework for speech-driven synthesis of real faces from a corpus of 3D video of a person speaking. Video-rate capture of dynamic 3D face shape and colour ap...
Ioannis A. Ypsilos, Adrian Hilton, Aseel Turkmani,...
ADC
2006
Springer
125views Database» more  ADC 2006»
13 years 12 months ago
A reconstruction-based algorithm for classification rules hiding
Data sharing between two organizations is common in many application areas e.g. business planing or marketing. Useful global patterns can be discovered from the integrated dataset...
Juggapong Natwichai, Xue Li, Maria E. Orlowska
AINA
2004
IEEE
13 years 12 months ago
An Efficient Clustered Architecture for P2P Networks
Peer-to-peer (P2P) computing offers many attractive features, such as self-organization, load-balancing, availability, fault tolerance, and anonymity. However, it also faces some ...
Juan Li, Son T. Vuong
« Prev « First page 1344 / 1391 Last » Next »