Sciweavers

28888 search results - page 5498 / 5778
» Computability and complexity in analysis
Sort
View
DSN
2003
IEEE
15 years 9 months ago
Dependability Enhancement for IEEE 802.11 Wireless LAN with Redundancy Techniques
The presence of physical obstacles and radio interference results in the so called “shadow regions” in wireless networks. When a mobile station roams into a shadow region, it ...
Dongyan Chen, Sachin Garg, Chandra M. R. Kintala, ...
HICSS
2003
IEEE
144views Biometrics» more  HICSS 2003»
15 years 9 months ago
A Self-Disclosure Model for Personal Health Information
The use of information technologies (IT) to collect personal health information is growing in popularity via computer-assisted interviewing and a wide variety of healthcare Web si...
Lotus E. Kam, William G. Chismar
141
Voted
ICPP
2003
IEEE
15 years 9 months ago
A Hardware-based Cache Pollution Filtering Mechanism for Aggressive Prefetches
Aggressive hardware-based and software-based prefetch algorithms for hiding memory access latencies were proposed to bridge the gap of the expanding speed disparity between proces...
Xiaotong Zhuang, Hsien-Hsin S. Lee
125
Voted
CASES
2003
ACM
15 years 9 months ago
A low-power accelerator for the SPHINX 3 speech recognition system
Accurate real-time speech recognition is not currently possible in the mobile embedded space where the need for natural voice interfaces is clearly important. The continuous natur...
Binu K. Mathew, Al Davis, Zhen Fang
CHI
2003
ACM
15 years 9 months ago
Breakingstory: visualizing change in online news
BreakingStory is an interactive system for visualizing change in online news. The system regularly collects the text from the front pages of international daily news web sites. It...
Jean Anne Fitzpatrick, James Reffell, Moryma Aydel...
« Prev « First page 5498 / 5778 Last » Next »