Sciweavers

13224 search results - page 30 / 2645
» Self-monitoring for Computer Users
Sort
View
TIT
2011
148views more  TIT 2011»
13 years 2 months ago
On Two-User Gaussian Multiple Access Channels With Finite Input Constellations
—Constellation Constrained (CC) capacity regions of two-user Single-Input Single-Output (SISO) Gaussian Multiple Access Channels (GMAC) are computed for several Non-Orthogonal Mu...
Jagadeesh Harshan, Bikash Sundar Rajan
FGCS
2010
111views more  FGCS 2010»
13 years 6 months ago
Autonomic metered pricing for a utility computing service
An increasing number of providers are offering utility computing services which require users to pay only when they use. Most of these providers currently charge users for metere...
Chee Shin Yeo, Srikumar Venugopal, Xingchen Chu, R...
IJNSEC
2010
143views more  IJNSEC 2010»
13 years 2 months ago
A New Secure Remote User Authentication Scheme with Smart Cards
Remote user authentication scheme is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. These types of schemes ...
Manoj Kumar
AC
1998
Springer
13 years 7 months ago
Natural Language Processing: A Human-Computer Interaction Perspective
Natural language processing has been in existence for more than fifty years. During this time, it has significantly contributed to the field of human-computer interaction in terms...
Bill Z. Manaris
JUCS
2010
162views more  JUCS 2010»
13 years 6 months ago
Enabling Personal Privacy for Pervasive Computing Environments
: Protection of personal data in the Internet is already a challenge today. Users have to actively look up privacy policies of websites and decide whether they can live with the te...
Susana Alcalde Bagüés, Andreas Zeidler...