Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    An Improved 6DOF Electromagnetic Tracking Algorithm with Anisotropic System Parameters

    An improved 6DOF electromagnetic tracking algorithm is proposed. It utilizes the scattering parameters, which are about the transmitter coils, the receiver coils and the involved circuits, to determine the pos...

    Yan Zhigang, Yuan Kui in Technologies for E-Learning and Digital Entertainment (2006)

  2. No Access

    Chapter and Conference Paper

    Perceiving Visual Emotions with Speech

    Embodied Conversational Agents (ECAs) with realistic faces are becoming an intrinsic part of many graphics systems employed in HCI applications. A fundamental issue is how people visually perceive the affect o...

    Zhigang Deng, Jeremy Bailenson, J. P. Lewis, Ulrich Neumann in Intelligent Virtual Agents (2006)

  3. Chapter and Conference Paper

    Application and Research on Affection Model Based on Bayesian Network

    It needs not only intelligence but also emotion for the computer to realize harmonious human computer interaction, which is one of the research focuses in the field of computer science. This paper proposes a h...

    Lin Shi, Zhiliang Wang, Zhigang Li in Entertainment Computing – ICEC 2007 (2007)

  4. No Access

    Chapter and Conference Paper

    Agent Collaboration for Multiple Trading Strategy Integration

    The collaboration of agents can undertake complicated tasks that cannot be handled well by a single agent. This is even true for excecuting multiple goals at the same time. In this paper, we demonstrate the us...

    Longbing Cao, Dan Luo, Yanshan **ao in Agent and Multi-Agent Systems: Technologie… (2008)

  5. No Access

    Chapter and Conference Paper

    WebCall – A Rich Context Mobile Research Framework

    The ever-increasing capability of mobile devices enables many mobile services far beyond a traditional voice call. In this paper, we present WebCall, a research framework on how to share and utilize the rich c...

    Zhigang Liu, Hawk Yin Pang, Jun Yang in Mobile Computing, Applications, and Servic… (2010)

  6. No Access

    Chapter and Conference Paper

    Network Security Situation Assessment Based on Hidden Semi-Markov Model

    This paper takes use of the hidden semi-Markov model to evaluate network security situation. HsMM modifies HMM model on the presumption that certain system status dwell time abides with exponential distributio...

    Boyun Zhang, Zhigang Chen, **ai Yan, Shulin Wang in Advanced Intelligent Computing (2012)

  7. No Access

    Chapter and Conference Paper

    Network Security Situation Assessment Based on HMM

    Network security situation assessment is the core of situation awareness, and is also a qualitative and quantitative description of network security state. In this paper, the security state and intrusion alarm...

    Boyun Zhang, Zhigang Chen, Shulin Wang in Advanced Intelligent Computing Theories an… (2012)

  8. No Access

    Chapter and Conference Paper

    Network Security Situation Assessment Based on Stochastic Game Model

    From the perspective of game theory, this paper studies the information security problem, establishes an offense and defense game model of information security, and puts forward a quantitative evaluation algor...

    Boyun Zhang, Zhigang Chen, Wensheng Tang, Qiang Fan in Advanced Intelligent Computing (2012)

  9. No Access

    Chapter and Conference Paper

    SOINS: A Real-Time Underwater Sonar-Inertial System for Pipeline 3D Reconstruction

    In this paper, we propose a real time underwater sonar-inertial system for pipeline reconstruction. In our approach, the sonar data is preprocessed by the likelihood method, from which we calculate the optimal...

    Wenzhi Gong, Li **ao, Tian Zeng, Yuchong Li in Intelligent Robotics and Applications (2022)