Sciweavers

4305 search results - page 777 / 861
» Analysing Protocol Implementations
Sort
View
MAGS
2008
122views more  MAGS 2008»
15 years 2 months ago
Integrating embodied conversational agent components with a generic framework
Embodied Conversational Agents (ECAs) are computer generated life-like characters that interact with human users in face-to-face conversations. To achieve natural multi-modal conve...
Hung-Hsuan Huang, Aleksandra Cerekovic, Kateryna T...
JSAC
2006
120views more  JSAC 2006»
15 years 2 months ago
A Tutorial on Cross-Layer Optimization in Wireless Networks
This tutorial paper overviews recent developments in optimization-based approaches for resource allocation problems in wireless systems. We begin by overviewing important results i...
Xiaojun Lin, Ness B. Shroff, R. Srikant
JWSR
2006
139views more  JWSR 2006»
15 years 2 months ago
Supporting Predictable Service Provision in MANETs Via Context-Aware Session Management
: The increasing ubiquity of wireless mobile devices is promoting unprecedented levels of electronic collaboration among devices interoperating to achieve a common goal. Issues rel...
Radu Handorean, Rohan Sen, Gregory Hackmann, Gruia...
IAJIT
2007
128views more  IAJIT 2007»
15 years 2 months ago
A Multi-Agent System for POS-Tagging Vocalized Arabic Texts
: In this paper, we address the problem of Part-Of-Speech(POS) tagging of Arabic texts with vowel marks. After the description of the specificities of Arabic language and the induc...
Chiraz Ben Othmane Zribi, Aroua Torjmen, Mohamed B...
NETWORK
2006
290views more  NETWORK 2006»
15 years 2 months ago
Progressive multi gray-leveling: a voice spam protection algorithm
As voice over IP gains popularity, it is easy to imagine that Internet hacking and other security problems we currently face with email spam will attack the VoIP environment. In c...
Dongwook Shin, Jinyoung Ahn, Choon Shim