Sciweavers

2135 search results - page 104 / 427
» Applications and Issues in Pen-Centric Computing
Sort
View
IJCNLP
2004
Springer
14 years 2 months ago
Spoken Versus Written Queries for Mobile Information Access: An Experiment on Mandarin Chinese
As Chinese is not alphabetic and the input of Chinese characters into computer is still a difficult and unsolved problem, voice retrieval of information becomes apparently an imp...
Heather Du, Fabio Crestani
SC
2004
ACM
14 years 2 months ago
Experiences in Design and Implementation of a High Performance Transport Protocol
This paper describes our experiences in the development of the UDP-based Data Transport (UDT) protocol, an application level transport protocol used in distributed data intensive ...
Yunhong Gu, Xinwei Hong, Robert L. Grossman
EUC
2008
Springer
13 years 10 months ago
A Context Management System for Supporting Context-Aware Applications
This paper presents a context management system for supporting context-aware applications in a smart home. In a ubiquitous computing environment context changes dynamically and th...
Eunhoe Kim, Jaeyoung Choi
NSDI
2008
13 years 11 months ago
Conducting Cybersecurity Research Legally and Ethically
The primary legal obstacles to conducting cybersecurity are not outright prohibitions but rather the difficulty of determining which of a large set of complex statutes might regul...
Aaron J. Burstein
SLIP
2004
ACM
14 years 2 months ago
Optical solutions for system-level interconnect
Throughput, power consumption, signal integrity, pin count and routing complexity are all increasingly important interconnect issues that the system designer must deal with. Recen...
Ian O'Connor