Cell Phones
Mostrando 37-41 de 41 artigos, teses e dissertações.
-
37. A new method for determining the number of gaussians in hidden Markov models for continuos speech recognition systems / Metodo para a determinação do numero de gaussianas em modelos ocultos de Markov para sistemas de reconhecimento de fala continua
Nowadays, HMM-based speech recognition systems are used in many real time processing applications, from cell phones to auto mobile automation. In this context, one important aspect to be considered is the HMM complexity, which directly determines the system computational load. So, in order to make the system feasible for practical purposes, it is interesting
Publicado em: 2006
-
38. USABILIDADE DE TELEFONES CELULARES COM BASE EM CRITÉRIOS ERGONÔMICOS / CELL PHONES USABILITY BASED ON ERGONOMIC CRITERIA
At present time, cell phone is a device found almost everywhere and in every situations of the people`s life as a condition known as Ubiquitous Technology. In 2003, the total cell phone users overcame the total fixed line users in Brazil. The frequently cell phone changes with different systems and without user centered studies increase the cell phone use di
Publicado em: 2005
-
39. AvaliaÃÃo experimental de detecÃÃo de colisÃo para jogos J2ME
Despite Experimental evaluation is an accepted and widespread approach for scientific validation in most scientific disciplines, only recently it has been systematically used in Software Engineering, with the objective to experimentally examine development approaches. In this scenario, there has been a growing demand for research in the area of Empirical Sof
Publicado em: 2005
-
40. MOLIC SEGUNDA EDIÇÃO: REVISÃO DE UMA LINGUAGEM PARA MODELAGEM DA INTERAÇÃO HUMANO-COMPUTADOR / MOLIC SECOND EDITION: REVISION OF A MODELING LANGUAGE FOR HUMAN-COMPUTER INTERACTION
Day after day, we discover new ways to use computation in various domains and for a variety of purposes: entertainment, medicine, education, communication, etc. Large-scale hardware production has made computers and mobile devices (for example, cell phones, PDAs and Tablet PCs) more accessible to an increasing number of users. The wide use of computation req
Publicado em: 2005
-
41. Wireless Technology Infrastructures for Authentication of Patients: PKI that Rings
As the public interest in consumer-driven electronic health care applications rises, so do concerns about the privacy and security of these applications. Achieving a balance between providing the necessary security while promoting user acceptance is a major obstacle in large-scale deployment of applications such as personal health records (PHRs). Robust and
American Medical Informatics Association.