Sciweavers

3095 search results - page 443 / 619
» Ubiquitous presence systems
Sort
View
ICMCS
2009
IEEE
153views Multimedia» more  ICMCS 2009»
13 years 6 months ago
Audio-visual privacy protection for video conference
Group video-conferencing systems are routinely used in major corporations, hospitals and universities for meetings, tele-medicine and distance learning among participants from very...
M. Vijay Venkatesh, Jian Zhao, L. Profitt, Sen-Chi...
CSMR
2010
IEEE
13 years 4 months ago
Co-evolving Annotations and Source Code through Smart Annotations
Annotations are a means to attach additional meta data to the source code of a system. Nowadays, more and more technologies rely on the presence of such annotations in the source c...
Andy Kellens, Carlos Noguera, Kris De Schutter, Co...
TSE
2010
230views more  TSE 2010»
13 years 3 months ago
Vulnerability Discovery with Attack Injection
The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being...
João Antunes, Nuno Ferreira Neves, Miguel C...
CORR
2011
Springer
204views Education» more  CORR 2011»
13 years 24 days ago
Decentralized Supply Chain Formation: A Market Protocol and Competitive Equilibrium Analysis
Supply chain formation is the process of determining the structure and terms of exchange relationships to enable a multilevel, multiagent production activity. We present a simple ...
William E. Walsh, Michael P. Wellman
ICASSP
2011
IEEE
13 years 23 days ago
MIMO radar diversity with Neyman-Pearson signal detection in non-Gaussian circumstance with non-orthogonal waveforms
The diversity gain of a multiple-input multiple-output (MIMO) system adopting the Neyman-Pearson (NP) criterion is derived for a signal-present versus signal-absent scalar hypothe...
Qian He, Rick S. Blum