Sciweavers

503 search results - page 90 / 101
» Authenticity by tagging and typing
Sort
View
CN
2007
77views more  CN 2007»
13 years 7 months ago
Secure many-to-one symbol transmission for implementation on smart cards
Multicast communication is arguably the most promising paradigm to enable mass Internet transmission of live events, or any other content sent on the network from a single source ...
Francesc Sebé, Alexandre Viejo, Josep Domin...
LRE
2008
174views more  LRE 2008»
13 years 7 months ago
IEMOCAP: interactive emotional dyadic motion capture database
Since emotions are expressed through a combination of verbal and non-verbal channels, a joint analysis of speech and gestures is required to understand expressive human communicati...
Carlos Busso, Murtaza Bulut, Chi-Chun Lee, Abe Kaz...
JSAC
2006
155views more  JSAC 2006»
13 years 7 months ago
LR-AKE-Based AAA for Network Mobility (NEMO) Over Wireless Links
Network mobility introduces far more complexity than host mobility. Therefore, host mobility protocols such as Mobile IPv6 (MIPv6) need to be extended to support this new type of m...
Hanane Fathi, SeongHan Shin, Kazukuni Kobara, Shya...
ETS
2000
IEEE
100views Hardware» more  ETS 2000»
13 years 7 months ago
Using computer-mediated communication to form a knowledge-building community with beginning teachers
This study investigated how different types of computer-mediated communication (CMC) such as asynchronous forums, synchronous forums and e-mail were used to support an alternative...
Brian Ferry, Julie Kiggins, Garry Hoban, Lori Lock...
ICDE
2009
IEEE
194views Database» more  ICDE 2009»
14 years 9 months ago
Effective XML Keyword Search with Relevance Oriented Ranking
Abstract-- Inspired by the great success of information retrieval (IR) style keyword search on the web, keyword search on XML has emerged recently. The difference between text data...
Zhifeng Bao, Tok Wang Ling, Bo Chen, Jiaheng Lu