Sciweavers

4345 search results - page 796 / 869
» Temporal Constraint Networks
Sort
View
ASSETS
2006
ACM
14 years 1 months ago
MobileASL: : intelligibility of sign language video as constrained by mobile phone technology
For Deaf people, access to the mobile telephone network in the United States is currently limited to text messaging, forcing communication in English as opposed to American Sign L...
Anna Cavender, Richard E. Ladner, Eve A. Riskin
VRST
1998
ACM
13 years 12 months ago
Multi-resolution model transmission in distributed virtual environments
Distributed virtual environments allow users at di erent geographical locations to share and interact within a common virtual environment via a local network or through the Intern...
Jimmy H. P. Chim, Rynson W. H. Lau, Antonio Si, Ho...
MOBICOM
1996
ACM
13 years 12 months ago
Security on the Move: Indirect Authentication using Kerberos
Even as mobile computing and network computing are gaining momentum, Internet security is sharing the spotlight. Security and authentication on open networks is already a difficul...
Armando Fox, Steven D. Gribble
IWANN
1997
Springer
13 years 12 months ago
The Pattern Extraction Architecture: A Connectionist Alternative to the Von Neumann Architecture
A detailed connectionist architecture is described which is capable of relating psychological behavior to the functioning of neurons and neurochemicals. The need to be able to bui...
L. Andrew Coward
ICC
2007
IEEE
139views Communications» more  ICC 2007»
13 years 11 months ago
Comparison of Protection Mechanisms: Capacity Efficiency and Recovery Time
High efficiency in capacity utilization and fast restoration are two primary goals of survivable design in optical networks. Shared backup path protection has been shown to be effi...
Wensheng He, Arun K. Somani