Sciweavers

762 search results - page 143 / 153
» How to realize
Sort
View
ESAS
2004
Springer
14 years 1 months ago
Secure Overlay for Service Centric Wireless Sensor Networks
Sensor networks consist of a potentially huge number of very small and resource limited self-organizing devices. Those devices offer different services and use services provided b...
Hans-Joachim Hof, Erik-Oliver Blaß, Martina ...
CA
2003
IEEE
14 years 1 months ago
Language-Driven Nonverbal Communication in a Bilingual Conversational Agent
This paper describes an animated conversational agent called Kare1 which integrates a talking head interface with a linguistically motivated human-machine dialogue system. The age...
Scott A. King, Alistair Knott, Brendan McCane
MICRO
2003
IEEE
132views Hardware» more  MICRO 2003»
14 years 1 months ago
Checkpoint Processing and Recovery: Towards Scalable Large Instruction Window Processors
Large instruction window processors achieve high performance by exposing large amounts of instruction level parallelism. However, accessing large hardware structures typically req...
Haitham Akkary, Ravi Rajwar, Srikanth T. Srinivasa...
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
14 years 1 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
SIGUCCS
2003
ACM
14 years 1 months ago
Teaching with technology, setting an example
Providing instructional technology support for faculty requires a range of skills, from knowledge of software and hardware, to an ability to communicate, teach workshops, and rela...
Trevor Murphy, Mika Hirai