Sciweavers

1005 search results - page 140 / 201
» Can machines call people
Sort
View
JNW
2006
63views more  JNW 2006»
13 years 9 months ago
Operational Experiment of Seamless Handover of a Mobile Router using Multiple Care-of Address Registration
NEMO Basic Support (NEMO BS) adds a mobility function to IPv6 routers, such a router is called as a mobile router. The network behind the mobile router (mobile network) becomes log...
Keiichi Shima, Yojiro Uo, Nobuo Ogashiwa, Satoshi ...
TPDS
2008
105views more  TPDS 2008»
13 years 9 months ago
peerTalk: A Peer-to-Peer Multiparty Voice-over-IP System
Multiparty voice-over-IP (MVoIP) services allow a group of people to freely communicate with each other via the Internet, which have many important applications such as online gami...
Xiaohui Gu, Zhen Wen, Philip S. Yu, Zon-Yin Shae
JOC
2007
133views more  JOC 2007»
13 years 9 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
CSCW
2002
ACM
13 years 8 months ago
A Descriptive Framework of Workspace Awareness for Real-Time Groupware
Supporting awareness of others is an idea that holds promise for improving the usability of real-time distributed groupware. However, there is little principled information availa...
Carl Gutwin, Saul Greenberg
DLOG
2009
13 years 6 months ago
Explaining by Example: Model Exploration for Ontology Comprehension
Abstract. In this paper, we describe an approach for ontology comprehension support called model exploration in which models for ontologies are generated and presented interactivel...
Johannes Bauer, Ulrike Sattler, Bijan Parsia