Sciweavers

910 search results - page 46 / 182
» Counting People in Groups
Sort
View
IJSNET
2007
91views more  IJSNET 2007»
13 years 9 months ago
SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks
: Most wireless ad hoc sensor networks are susceptible to routing level attacks, in which an adversary masquerades as a legitimate node to convince neighbouring nodes that it is th...
Jeff Janies, Chin-Tser Huang, Nathan L. Johnson, T...
TCAD
2011
13 years 4 months ago
Using Launch-on-Capture for Testing Scan Designs Containing Synchronous and Asynchronous Clock Domains
—This paper presents a hybrid automatic test pattern generation (ATPG) technique using the staggered launch-oncapture (LOC) scheme followed by the one-hot LOC scheme for testing ...
Shianling Wu, Laung-Terng Wang, Xiaoqing Wen, Zhig...
ICALT
2008
IEEE
14 years 4 months ago
Encouraging Persons with Hearing Problem to Learn Sign Language by Internet Websites
Nowadays the Internet users are from different ages and groups. Disabled people are a group of the Internet users. Some websites are especially created for these people. One group...
Mohammad Shirali-Shahreza, Sajad Shirali-Shahreza
HT
2007
ACM
14 years 1 months ago
Identifying subcommunities using cohesive subgroups in social hypertext
Web pages can be modeled as nodes in a social network, and hyperlinks between pages form links (relationships) between the nodes. Links may take the form of comments, for example ...
Alvin Chin, Mark H. Chignell
CHI
2005
ACM
14 years 10 months ago
Understanding email use: predicting action on a message
Email consumes significant time and attention in the workplace. We conducted an organizational survey to understand how and why people attend to incoming email messages. We examin...
Laura A. Dabbish, Robert E. Kraut, Susan R. Fussel...