Sciweavers

2244 search results - page 327 / 449
» Subjective Document Classification Using Network Analysis
Sort
View
156
Voted
IJMHCI
2011
249views more  IJMHCI 2011»
14 years 9 months ago
3D Talking-Head Interface to Voice-Interactive Services on Mobile Phones
We present a novel framework for easy creation of interactive, platform-independent voice-services with an animated 3D talking-head interface, on mobile phones. The framework supp...
Jirí Danihelka, Roman Hak, Lukas Kencl, Jir...
116
Voted
TPDS
2010
159views more  TPDS 2010»
15 years 17 days ago
Exploring In-Situ Sensing Irregularity in Wireless Sensor Networks
The circular sensing model has been widely used to estimate performance of sensing applications in existing analysis and simulations. While this model provides valuable high-level...
Joengmin Hwang, Tian He, Yongdae Kim
IWCMC
2010
ACM
15 years 7 months ago
Turbo packet combining techniques for multi-relay-assisted systems over multi-antenna broadband channels
This paper focuses on turbo packet combining techniques for multi-relay-assisted systems operating over multiple-input multiple-output (MIMO) broadband channel. Two packet combini...
Houda Chafnaji, Halim Yanikomeroglu, Tarik Ait-Idi...
ADHOCNOW
2009
Springer
15 years 3 months ago
Secure EPC Gen2 Compliant Radio Frequency Identification
The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard a de facto specification for inexpensive tags in the RFID industry. Recently three EPCGen2 complian...
Mike Burmester, Breno de Medeiros, Jorge Munilla, ...
104
Voted
CCS
2008
ACM
15 years 4 months ago
Dependent link padding algorithms for low latency anonymity systems
Low latency anonymity systems are susceptive to traffic analysis attacks. In this paper, we propose a dependent link padding scheme to protect anonymity systems from traffic analy...
Wei Wang 0002, Mehul Motani, Vikram Srinivasan