Sciweavers

8655 search results - page 1653 / 1731
» Challenges for Trusted Computing
Sort
View
MSWIM
2004
ACM
14 years 3 months ago
IEEE 802.11 rate adaptation: a practical approach
Today, three different physical (PHY) layers for the IEEE 802.11 WLAN are available (802.11a/b/g); they all provide multi-rate capabilities. To achieve a high performance under v...
Mathieu Lacage, Mohammad Hossein Manshaei, Thierry...
NORDICHI
2004
ACM
14 years 3 months ago
Adaptivity in speech-based multilingual e-mail client
In speech interfaces users must be aware what can be done with the system – in other words, the system must provide information to help the users to know what to say. We have ad...
Esa-Pekka Salonen, Mikko Hartikainen, Markku Turun...
PLDI
2004
ACM
14 years 3 months ago
Region inference for an object-oriented language
Region-based memory management offers several important potential advantages over garbage collection, including real-time performance, better data locality, and more efficient us...
Wei-Ngan Chin, Florin Craciun, Shengchao Qin, Mart...
SIGCOMM
2004
ACM
14 years 3 months ago
Sizing router buffers
All Internet routers contain buffers to hold packets during times of congestion. Today, the size of the buffers is determined by the dynamics of TCP’s congestion control algor...
Guido Appenzeller, Isaac Keslassy, Nick McKeown
VRST
2004
ACM
14 years 3 months ago
Observing effects of attention on presence with fMRI
Presence is one of the goals of many virtual reality systems. Historically, in the context of virtual reality, the concept of presence has been associated much with spatial percep...
Sungkil Lee, Gerard Jounghyun Kim, Janghan Lee
« Prev « First page 1653 / 1731 Last » Next »