Sciweavers

334 search results - page 25 / 67
» AIM2: Improved implementation of AIM
Sort
View
GLOBECOM
2008
IEEE
13 years 10 months ago
User Selection for Multiple-Antenna Broadcast Channel with Zero-Forcing Beamforming
Abstract—This paper investigates the zero-forcing (ZF) beamforming transmit strategy in the multiple-antenna multiuser downlink systems. We consider the case of mobile users equi...
Saeed Kaviani, Witold A. Krzymien
BWCCA
2010
13 years 4 months ago
Constructivist Approach to Information Security Awareness in the Middle East
Abstract--This paper studies the application of an approach to enhance information security awareness amongst employees within middleeastern companies, in effort to improve informa...
Mohammed Boujettif, Yongge Wang
PERCOM
2009
ACM
14 years 3 months ago
Speech as a Feedback Modality for Smart Objects
—One part of the vision of ubiquitous computing is the integration of sensing and actuation nodes into everyday objects, clothes worn on the body, and in large numbers into the e...
Clemens Lombriser, Andreas Bulling, Andreas Breite...
TEI
2009
ACM
141views Hardware» more  TEI 2009»
14 years 3 months ago
Kurio: a museum guide for families
We discuss three design strategies for improving the quality of social interaction and learning with interactive museum guides: 1) embodied interaction; 2) game-learning; 3) a hyb...
Ron Wakkary, Marek Hatala, Kevin Muise, Karen Tane...
DDECS
2009
IEEE
106views Hardware» more  DDECS 2009»
14 years 3 months ago
Forward and backward guarding in early output logic
—Quasi Delay Insensitive asynchronous logic is a very robust system allowing safe implementations while requiring minimal timing assumptions. Unfortunately the design methodologi...
Charlie Brej, Doug Edwards