Sciweavers

6846 search results - page 1358 / 1370
» Developing an Active Observer
Sort
View
INFOCOM
2010
IEEE
13 years 8 months ago
Enhancing Wireless TCP: A Serialized-Timer Approach
— In wireless networks, TCP performs unsatisfactorily since packet reordering and random losses may be falsely interpreted as congestive losses. This causes TCP to trigger fast r...
Chengdi Lai, Ka-Cheong Leung, Victor O. K. Li
INTERNET
2010
141views more  INTERNET 2010»
13 years 8 months ago
Computing for Human Experience: Semantics-Empowered Sensors, Services, and Social Computing on the Ubiquitous Web
abstractions, concepts, and actions that characterize human experiences. This will herald computing for human experience (CHE). The CHE vision is built on a suite of technologies t...
Amit Sheth
ISF
2010
109views more  ISF 2010»
13 years 8 months ago
From IT deployment capabilities to competitive advantage: An exploratory study in China
As more and more companies are deploying, or plan to deploy, information systems, the organizational capabilities to effectively deploy information technologies to support and shap...
Jun Tian, Kanliang Wang, Yan Chen, Björn Joha...
PERVASIVE
2010
Springer
13 years 8 months ago
LOC8: A Location Model and Extensible Framework for Programming with Location
ing model abstracts over various types of positioning systems and incorporates the capture of uncertainty, serving as a foundation on which developers can apply sensor-fusion techn...
Graeme Stevenson, Juan Ye, Simon Dobson, Paddy Nix...
PR
2010
179views more  PR 2010»
13 years 8 months ago
Robust palmprint verification using 2D and 3D features
This paper presents a new personal authentication system that simultaneously exploits 2D and 3D palmprint features. The objective of our work is to improve accuracy and robustness...
David Zhang, Vivek Kanhangad, Nan Luo, Ajay Kumar
« Prev « First page 1358 / 1370 Last » Next »