Sciweavers

480 search results - page 84 / 96
» Protocol for Collaborative Multimedia Presentations
Sort
View
TWC
2008
156views more  TWC 2008»
13 years 7 months ago
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
Event boundary detection is in and of itself a useful application in wireless sensor networks (WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such ...
Kui Ren, Kai Zeng, Wenjing Lou
CCR
2004
103views more  CCR 2004»
13 years 7 months ago
Reconsidering wireless systems with multiple radios
The tremendous popularity of wireless systems in recent years has led to the commoditization of RF transceivers (radios) whose prices have fallen dramatically. The lower cost allo...
Paramvir Bahl, Atul Adya, Jitendra Padhye, Alec Wo...
ETS
2002
IEEE
150views Hardware» more  ETS 2002»
13 years 7 months ago
Assessing group learning and shared understanding in technology-mediated interaction
Without shared understanding, hardly any group learning takes place. Though much has been written about the essence of shared understanding, less is known about how to assess the ...
Ingrid Mulder, Janine Swaak, Joseph Kessels
SOCIALCOM
2010
13 years 5 months ago
Assessing the Value of Contributions in Tagging Systems
-- Assessing the value of individual users' contributions in peer-production systems is paramount to the design of mechanisms that support collaboration and improve users'...
Elizeu Santos-Neto, Flavio Figueiredo, Jussara M. ...
SIGCOMM
1998
ACM
13 years 11 months ago
Secure Group Communications Using Key Graphs
Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group ...
Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam