Search Results - IEEE Access

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    Dominant and Complementary Emotion Recognition From Still Images of Faces by Jianzhu Guo, Zhen Lei, Jun Wan, Avots, Egils, Hajarolasvadi, Noushin, Knyazev, Boris, Kuharenko, Artem, Silveira Jacques Junior, Julio C., Baró, Xavier, Demirel, Hasan, Escalera, Sergio, Allik, Jüri, Anbarjafari, Gholamreza

    Published in IEEE access (01-01-2018)
    “…Emotion recognition has a key role in affective computing. Recently, fine-grained emotion analysis, such as compound facial expression of emotions, has…”
    Get full text
    Journal Article
  2. 2

    A Systematic Mapping Study of Software Development With GitHub by Cosentino, Valerio, Canovas Izquierdo, Javier L., Cabot, Jordi

    Published in IEEE access (01-01-2017)
    “…Context: GitHub, nowadays the most popular social coding platform, has become the reference for mining Open Source repositories, a growing research trend…”
    Get full text
    Journal Article
  3. 3

    SeVEP: Secure and Verifiable Electronic Polling System by Qureshi, Amna, Megias, David, Rifa-Pous, Helena

    Published in IEEE access (2019)
    “…Electronic polling systems promise benefits to voters such as accessibility and convenience that enable them to cast their votes at any time, from any…”
    Get full text
    Journal Article
  4. 4

    On Watermarking for Collaborative Model-Driven Engineering by Martinez, Salvador, Gerard, Sebastien, Cabot, Jordi

    Published in IEEE access (01-01-2018)
    “…Collaborative development scenarios often require models to be shared among the different stakeholders. These stakeholders are mostly remote with communication…”
    Get full text
    Journal Article
  5. 5
  6. 6

    QoE Aware Resource Allocation for Video Communications over LTE Based Mobile Networks by Perera, Ryan, Fernando, Anil, Mallikarachchi, Thanuja, Arachchi, Hemantha Kodikara, Pourazad, Mahsa

    Published in EAI endorsed transactions on cloud systems (01-12-2016)
    “…As the limits of video compression and usable wireless radio resources are exhausted, providing increased protection to critical data is regarded as a way…”
    Get full text
    Journal Article