Sciweavers

448 search results - page 33 / 90
» Who is in Control
Sort
View

Publication
304views
17 years 2 months ago
A Binary Feedback Scheme for Congestion Avoidance in Computer Networks with Connectionless Network Layer
We propose a scheme for congestion avoidance in networks using a connectionless protocol at the network layer. The scheme uses a minimal amount of feedback from the network to the ...
K. Ramakrishnan and R. Jain
CHI
2005
ACM
16 years 4 months ago
Evaluating paper prototypes on the street
The evaluation of paper prototypes is normally conducted in controlled settings such as a usability lab. This paper, in contrast, reports on a study where evaluations of a paper p...
David G. Hendry, Sara Mackenzie, Ann Kurth, Freya ...
ICASSP
2009
IEEE
15 years 10 months ago
A watermarking-based method for single-channel audio source separation
In this paper, we address the issue of audio source separation with a single channel, i.e. the estimation of source signals from a single mixture of these signals. This problem is...
Mathieu Parvaix, Laurent Girin, Jean-Marc Brossier
DCOSS
2009
Springer
15 years 10 months ago
Speed Dating Despite Jammers
Many wireless standards and protocols today, such as WLAN and Bluetooth, operate on similar frequency bands. While this permits an efficient usage of the limited medium capacity, ...
Dominic Meier, Yvonne Anne Pignolet, Stefan Schmid...
PET
2009
Springer
15 years 10 months ago
Privacy-Preserving Policy-Based Information Transfer
As the global society becomes more interconnected and more privacy-conscious, communication protocols must balance access control with protecting participants’ privacy. A common ...
Emiliano De Cristofaro, Stanislaw Jarecki, Jihye K...