Sciweavers

495 search results - page 47 / 99
» Information theory of wideband communications
Sort
View
DIALM
2008
ACM
140views Algorithms» more  DIALM 2008»
13 years 9 months ago
Latency of opportunistic forwarding in finite regular wireless networks
In opportunistic forwarding, a node randomly relays packets to one of its neighbors based on local information, without the knowledge of global topology. Each intermediate node co...
Prithwish Basu, Chi-Kin Chau
JITECH
2008
57views more  JITECH 2008»
13 years 7 months ago
Offshore middlemen: transnational intermediation in technology sourcing
The tendency of acquiring information systems and other high technology services from international suppliers continues at unprecedented levels. The primary motivation for the off...
Volker Mahnke, Jonathan Wareham, Niels Bjør...
ESWA
2008
158views more  ESWA 2008»
13 years 7 months ago
The application of extension neuro-network on computer-assisted lip-reading recognition for hearing impaired
Within the communication process of human beings, the speaker's facial expression and lip-shape movement contains extremely rich language information. The hearing impaired, a...
Yun-Long Lay, Chung-Ho Tsai, Hui-Jen Yang, Chern-S...
CSCW
2012
ACM
12 years 3 months ago
Setting the stage for interaction: a tablet application to augment group discussion in a seminar class
We present a tablet-based system to collaboratively track discussion topics and ideas in a seminar-style discussion classroom. Each student uses his or her own tablet to share tex...
Drew Harry, Eric Gordon, Chris Schmandt
CCS
2008
ACM
13 years 9 months ago
Location privacy of distance bounding protocols
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As...
Kasper Bonne Rasmussen, Srdjan Capkun