Sciweavers

808 search results - page 141 / 162
» Distributed Anonymization: Achieving Privacy for Both Data S...
Sort
View
MOBIHOC
2007
ACM
14 years 8 months ago
Bounds for the capacity of wireless multihop networks imposed by topology and demand
Existing work on the capacity of wireless networks predominantly considers homogeneous random networks with random work load. The most relevant bounds on the network capacity, e.g...
Alireza Keshavarz-Haddad, Rudolf H. Riedi
MOBISYS
2009
ACM
14 years 9 months ago
EnTracked: energy-efficient robust position tracking for mobile devices
An important feature of a modern mobile device is that it can position itself. Not only for use on the device but also for remote applications that require tracking of the device....
Mikkel Baun Kjærgaard, Jakob Langdal, Torben...
CIVR
2008
Springer
182views Image Analysis» more  CIVR 2008»
13 years 11 months ago
Fusion of audio and visual cues for laughter detection
Past research on automatic laughter detection has focused mainly on audio-based detection. Here we present an audiovisual approach to distinguishing laughter from speech and we sh...
Stavros Petridis, Maja Pantic
ICDCS
2009
IEEE
13 years 6 months ago
A Case Study of Traffic Locality in Internet P2P Live Streaming Systems
With the ever-increasing P2P Internet traffic, recently much attention has been paid to the topology mismatch between the P2P overlay and the underlying network due to the large a...
Yao Liu, Lei Guo, Fei Li, Songqing Chen
ICS
1999
Tsinghua U.
14 years 1 months ago
Realizing the performance potential of the virtual interface architecture
The Virtual Interface (VI) Architecture provides protected userlevel communication with high delivered bandwidth and low permessage latency, particularly for small messages. The V...
Evan Speight, Hazim Abdel-Shafi, John K. Bennett