Sciweavers

7741 search results - page 1448 / 1549
» Security in Active Networks
Sort
View
ICASSP
2009
IEEE
15 years 2 months ago
Social correlates of turn-taking behavior
The goal of this research is to infer traits about groups of people from their turn-taking behavior in natural conversation. These traits are latent attributes in a social network...
John Grothendieck, Allen L. Gorin, Nash M. Borges
IAJIT
2010
152views more  IAJIT 2010»
15 years 1 months ago
Applicability of Telemedicine in Bangladesh: Current Status and Future Prospects
: Telemedicine refers to the use of information and communication technology to provide and support health care mainly for the purpose of providing consultation. It is also a way t...
Ahasanun Nessa, Moshaddique Al Ameen, Sana Ullah, ...
CVPR
2011
IEEE
15 years 19 days ago
Multi-agent event recognition in structured scenarios
We present a framework for the automatic recognition of complex multi-agent events in settings where structure is imposed by rules that agents must follow while performing activit...
Vlad Morariu, Larry Davis
CORR
2010
Springer
163views Education» more  CORR 2010»
14 years 11 months ago
Toward a Push-Scalable Global Internet
Push message delivery, where a client maintains an "always-on" connection with a server in order to be notified of a (asynchronous) message arrival in real-time, is incre...
Sachin Agarwal
JSAC
2011
167views more  JSAC 2011»
14 years 11 months ago
Decentralized Cognitive Radio Control Based on Inference from Primary Link Control Information
This work on cognitive radio access ventures beyond the more traditional “listen-before-talk” paradigm that underlies many cognitive radio access proposals. We exploit the bi-...
Senhua Huang, Xin Liu, Zhi Ding
« Prev « First page 1448 / 1549 Last » Next »