Sciweavers

6480 search results - page 1192 / 1296
» Proximity Communication and Time
Sort
View
143
Voted
CSCW
2008
ACM
15 years 6 months ago
Providing awareness in multi-synchronous collaboration without compromising privacy
When involved in collaborative tasks, users often choose to use multi-synchronous applications in order to concurrently work in isolation. Hence, privacy of their changes is maint...
Claudia-Lavinia Ignat, Stavroula Papadopoulou, G&e...
135
Voted
DAC
2008
ACM
15 years 6 months ago
SHIELD: a software hardware design methodology for security and reliability of MPSoCs
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Prev...
Krutartha Patel, Sri Parameswaran
ACL
2008
15 years 6 months ago
A Critical Reassessment of Evaluation Baselines for Speech Summarization
We assess the current state of the art in speech summarization, by comparing a typical summarizer on two different domains: lecture data and the SWITCHBOARD corpus. Our results ca...
Gerald Penn, Xiaodan Zhu
PEWASUN
2008
ACM
15 years 6 months ago
Experimentation and performance evaluation of rate adaptation algorithms in wireless mesh networks
In this paper we present an experimental study conducted in 802.11based mesh networks of three existing rate adaptation algorithms. The aim of this study is twofold. On the one ha...
Emilio Ancillotti, Raffaele Bruno, Marco Conti
SNPD
2008
15 years 6 months ago
An Efficient Parallel Eye Detection Algorithm on Facial Color Images
As processing power becomes cheaper and more available in cluster of computers, the need for parallel algorithm that can harness this computing potentials will increase. One applic...
Jalal A. Nasiri, M. Amir Moulavi, Sepideh Nazemi G...
« Prev « First page 1192 / 1296 Last » Next »