Sciweavers

15379 search results - page 438 / 3076
» Protecting users from
Sort
View
ICC
2009
IEEE
132views Communications» more  ICC 2009»
15 years 11 months ago
A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity
—A key agreement protocol is a protocol whereby two or more communicating parties can agree on a key or exchange information over an open communication network in such a way that...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
ICC
2008
IEEE
105views Communications» more  ICC 2008»
15 years 11 months ago
Scheduling and Pre-Conditioning in Multi-User MIMO TDD Systems
Abstract—The downlink transmission in multi-user multipleinput multiple-output (MIMO) systems has been extensively studied from both communication-theoretic and information-theor...
Jubin Jose, Alexei Ashikhmint, Phil Whiting, Srira...
ICMCS
2007
IEEE
144views Multimedia» more  ICMCS 2007»
15 years 11 months ago
Analysis, User Interface, and their Evaluation for Student Presentation Videos
In the domain of candidly-captured student presentation videos, we examine and evaluate approaches for multimodal analysis and indexing of audio and video. We apply visual segment...
Alexander Haubold, John R. Kender
189
Voted
TABLETOP
2006
IEEE
15 years 10 months ago
Multi-User Interface and Interactions on Direct-Touch Horizontal Surfaces: Collaborative Tabletop Research at MERL
While “displays” have the connotation of affording visual output, “surfaces” invite the users to interact. What happens then when the surfaces are also displays, when a di...
Chia Shen
ICSM
2005
IEEE
15 years 10 months ago
An Empirical Comparison of Test Suite Reduction Techniques for User-Session-Based Testing of Web Applications
Automated cost-effective test strategies are needed to provide reliable, secure, and usable web applications. As a software maintainer updates an application, test cases must accu...
Sara Sprenkle, Sreedevi Sampath, Emily Gibson, Lor...