We assessed the feasibility of “bridging the digital divide” by training community health advisors (CHAs) from low-income communities to use high-quality Internet-based health...
Thomas K. Houston, Kimberly Robinson, Eta Berner, ...
When IEEE 802.11i draft[1] proposed TKIP, it is expected to improve WEP on both active and passive attack methods. TKIP uses more sophisticated methods to distribute and manage se...
Recent growth of the geospatial information on the web has made it possible to easily access various maps and orthoimagery. By integrating these maps and imagery, we can create in...
Ching-Chien Chen, Craig A. Knoblock, Cyrus Shahabi...
Several Software Architecture Design Methods (SADM) have been published, reviewed, and compared. But these surveys and comparisons are mostly centered on intrinsic elements of the...
Davide Falessi, Giovanni Cantone, Philippe Kruchte...
This paper studies the use of visual blur effects, i.e., blurring of parts of the image fed back to the user, for First-Person-Navigations in Virtual Environments (VE). First, we ...