Sciweavers

12183 search results - page 2403 / 2437
» Computers under Attacks!
Sort
View
JOT
2007
124views more  JOT 2007»
13 years 8 months ago
Displaying Updated Stock Quotes
This paper describes how to extract stock quote data and display it with a dynamic update (using free, but delayed data streams). As a part of the architecture of the program, we ...
Douglas Lyon
JSAC
2007
180views more  JSAC 2007»
13 years 8 months ago
A Cross-Layer Approach for WLAN Voice Capacity Planning
— This paper presents an analytical approach to determining the maximum number of on/off voice flows that can be supported over a wireless local area network (WLAN), under a qua...
Yu Cheng, Xinhua Ling, Wei Song, Lin X. Cai, Weihu...
TWC
2008
105views more  TWC 2008»
13 years 8 months ago
Receive Antenna Array Strategies in Fading and Interference: An Outage Probability Comparison
We explore tradeoffs between different reception strategies of multiple receive antennas in fading channels with co-channel interference (CCI). Our tradeoff analysis is based on ou...
Juan M. Romero-Jerez, Andrea J. Goldsmith
UAIS
2008
172views more  UAIS 2008»
13 years 8 months ago
Recent developments in visual sign language recognition
Abstract Research in the field of sign language recognition has made significant advances in recent years. The present achievements provide the basis for future applications with t...
Ulrich von Agris, Jörg Zieren, Ulrich Canzler...
ALGORITHMICA
2002
97views more  ALGORITHMICA 2002»
13 years 8 months ago
Testing and Spot-Checking of Data Streams
Abstract. We consider the tasks of testing and spot-checking for data streams. These testers and spotcheckers are potentially useful in real-time or near real-time applications tha...
Joan Feigenbaum, Sampath Kannan, Martin Strauss, M...
« Prev « First page 2403 / 2437 Last » Next »