Sciweavers

293 search results - page 39 / 59
» User Interface Requirements for Authentication of Communicat...
Sort
View
CCS
2008
ACM
13 years 9 months ago
Online subscriptions with anonymous access
Online privacy is an increasingly important problem, as many services are now offered in a digital form. Privacy (or the lack thereof) is of a special concern in subscriptions to ...
Marina Blanton
NETGAMES
2006
ACM
14 years 1 months ago
Telebuddies on the move: social stitching to enhance the networked gaming experience
In this paper we report on our work to enable “laid-back” social interactions using television as a primary interaction medium and mobile devices that participate as a seconda...
Kris Luyten, Kristof Thys, Steven Huypens, Karin C...
ICC
2009
IEEE
162views Communications» more  ICC 2009»
14 years 2 months ago
Distributed Uplink Signal Processing of Cooperating Base Stations Based on IQ Sample Exchange
—Cellular systems in general suffer from co-channel interference, when simultaneous transmissions in other cells use the same physical resources. In order to mitigate such co-cha...
Christian Hoymann, Laetitia Falconetti, Rohit Gupt...
AAAI
1994
13 years 9 months ago
An Experiment in the Design of Software Agents
We describe a bottom-up approach to the design of software agents. We built and tested an agent system that addresses the real-world problem of handling the activities involved in...
Henry A. Kautz, Bart Selman, Michael H. Coen, Stev...
HPDC
2008
IEEE
14 years 2 months ago
XenLoop: a transparent high performance inter-vm network loopback
Advances in virtualization technology have focused mainly on strengthening the isolation barrier between virtual machines (VMs) that are co-resident within a single physical machi...
Jian Wang, Kwame-Lante Wright, Kartik Gopalan