Sciweavers

2354 search results - page 298 / 471
» DRM as a layered system
Sort
View
AGENTS
2001
Springer
14 years 26 days ago
Tears and fears: modeling emotions and emotional behaviors in synthetic agents
Emotions play a critical role in creating engaging and believable characters to populate virtual worlds. Our goal is to create general computational models to support characters t...
Jonathan Gratch, Stacy Marsella
INFOCOM
2000
IEEE
14 years 22 days ago
Transport and Application Protocol Scrubbing
— This paper describes the design and implementation of a protocol scrubber, a transparent interposition mechanism for explicitly removing network attacks at both the transport a...
G. Robert Malan, David Watson, Farnam Jahanian, Pa...
ASPLOS
2009
ACM
14 years 11 days ago
Gordon: using flash memory to build fast, power-efficient clusters for data-intensive applications
As our society becomes more information-driven, we have begun to amass data at an astounding and accelerating rate. At the same time, power concerns have made it difficult to brin...
Adrian M. Caulfield, Laura M. Grupp, Steven Swanso...
SECON
2010
IEEE
13 years 6 months ago
SAND: Sectored-Antenna Neighbor Discovery Protocol for Wireless Networks
Abstract--Directional antennas offer many potential advantages for wireless networks such as increased network capacity, extended transmission range and reduced energy consumption....
Emad Felemban, Robert Murawski, Eylem Ekici, Sangj...
VTC
2010
IEEE
156views Communications» more  VTC 2010»
13 years 6 months ago
A Unified MIMO Architecture Subsuming Space Shift Keying, OSTBC, BLAST and LDC
In this paper, motivated by the recent concept of Spatial Modulation (SM), we propose a novel Generalized Space-Time Shift Keying (G-STSK) architecture, which acts as a unified Mul...
Shinya Sugiura, Sheng Chen, Lajos Hanzo