Sciweavers

1395 search results - page 117 / 279
» Modeling betweenness for question answering
Sort
View
MSWIM
2006
ACM
15 years 10 months ago
Establishing how many VoIP calls a wireless LAN can support without performance degradation
The use of Voice IP (VoIP) over wireless local area networks (WLAN) is a topic of great interest in the research arena. This paper attempts to answer the question: how many VoIP c...
Ángel Cuevas Rumín, Eur Ing Chris Gu...
PERCOM
2007
ACM
16 years 4 months ago
Automatic Generation of Device User-Interfaces?
One of the visions of pervasive computing is using mobile computers to interact with networked devices. A question raised by this vision is: Should the userinterfaces of these dev...
Olufisayo Omojokun, Prasun Dewan
IPPS
2006
IEEE
15 years 10 months ago
Fault and intrusion tolerance of wireless sensor networks
The following three questions should be answered in developing new topology with more powerful ability to tolerate node-failure in wireless sensor network. First, what is node-fai...
Liang-min Wang, Jianfeng Ma, Chao Wang, A. C. Kot
110
Voted
AUIC
2005
IEEE
15 years 10 months ago
Evaluation of Two Textual Programming Notations for Children
Many researchers have developed many programming environments for children. Typically each of these environments contains its own programming notation ranging from computer code t...
Timothy N. Wright, Andy Cockburn
167
Voted
ASIACRYPT
2000
Springer
15 years 9 months ago
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
An authenticated encryption scheme is a symmetric encryption scheme whose goal is to provide both privacy and integrity. We consider two possible notions of authenticity for such ...
Mihir Bellare, Chanathip Namprempre