Sciweavers

1429 search results - page 274 / 286
» Beyond Ontology in Information Systems
Sort
View
CHI
2010
ACM
14 years 3 months ago
Embodied social proxy: mediating interpersonal connection in hub-and-satellite teams
Current business conditions have given rise to distributed teams that are mostly collocated except for one remote member. These “hub-and-satellite” teams face the challenge of...
Gina Venolia, John C. Tang, Ruy Cervantes, Sara Bl...
FSE
2009
Springer
159views Cryptology» more  FSE 2009»
14 years 3 months ago
Intel's New AES Instructions for Enhanced Performance and Security
The Advanced Encryption Standard (AES) is the Federal Information Processing Standard for symmetric encryption. It is widely believed to be secure and efficient, and is therefore b...
Shay Gueron
PIMRC
2008
IEEE
14 years 2 months ago
An adaptive holdoff algorithm based on node state for IEEE 802.16 mesh mode with coordinated distributed scheduling
Wireless mesh networks (WMNs) are one of the key features of beyond 3G system because of their flexible and lowcost deployment. IEEE 802.16 mesh mode has recently emerged as an alt...
Bong Chan Kim, Dong Gu Kwak, Heecheol Song, Hwang ...
MM
2004
ACM
94views Multimedia» more  MM 2004»
14 years 1 months ago
Towards automated story analysis using participatory design
Involving a school teacher in the development of the intelligent writing tutor StoryStation allowed progress to be made on the problem of story classification, an aspect of story...
Harry Halpin, Johanna D. Moore, Judy Robertson
MUM
2004
ACM
170views Multimedia» more  MUM 2004»
14 years 1 months ago
Multiple embedding using robust watermarks for wireless medical images
Within the expanding paradigm of medical imaging and wireless communications there is increasing demand for transmitting diagnostic medical imagery over error-prone wireless commu...
Dominic Osborne, Derek Abbott, Matthew Sorell, Der...