Sciweavers

JCP
2007
105views more  JCP 2007»
13 years 4 months ago
Intuitive Network Applications: Learning for Personalized Converged Services Involving Social Networks
Abstract— The convergence of the wireline telecom, wireless telecom, and internet networks and the services they provide offers tremendous opportunities in services personalizati...
Robert Dinoff, Tin Kam Ho, Richard Hull, Bharat Ku...
JCP
2007
154views more  JCP 2007»
13 years 4 months ago
Partially Reconfigurable Vector Processor for Embedded Applications
—Embedded systems normally involve a combination of hardware and software resources designed to perform dedicated tasks. Such systems have widely crept into industrial control, a...
Muhammad Z. Hasan, Sotirios G. Ziavras
JCP
2007
98views more  JCP 2007»
13 years 4 months ago
Computation of Immittance and Line Spectral Frequencies Based on Inter-frame Ordering Property
— Line spectral frequencies (LSF) and immittance spectral frequencies (ISF) are widely used in modern speech codecs based on autoregressive model. This paper addresses LSF and IS...
Vasyl Semenov
JCP
2007
117views more  JCP 2007»
13 years 4 months ago
Internet Research Support System: An Application for Immediate Feedback in Authentic Internet Research
– A prototype Internet Research Support System is presented based on earlier work on the modeling of online reading behavior and evaluating the reading process and its outcomes. ...
Nasiroh Omar, Colin Higgins, Colin G. Harrison, Di...
JCP
2007
104views more  JCP 2007»
13 years 4 months ago
Cyclic Convolution Algorithm Formulations Using Polynomial Transform Theory
— This work presents a mathematical framework for the development of efficient algorithms for cyclic convolution computations. The framework is based on the Chinese Reminder Theo...
Abraham H. Diaz-Perez, Domingo Rodríguez
JCP
2007
121views more  JCP 2007»
13 years 4 months ago
p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework
— Every time a user conducts an electronic transaction over the Internet a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious br...
Sudip Chakraborty, Indrajit Ray
JCP
2007
100views more  JCP 2007»
13 years 4 months ago
Modelling Internet End-to-End Loss Behaviors: A Congestion Control Perspective
— This paper proposes a new approach to modelling and controlling Internet end-to-end loss behaviours. Rather than select the model structure from the loss observations as being ...
Vinh Bui, Weiping Zhu, Ruhul A. Sarker
JCP
2007
120views more  JCP 2007»
13 years 4 months ago
Application of Multi-Attribute Decision Making Approach to Learning Management Systems Evaluation
—The article presents an approach to the development of multi-attribute decision making model that is based on DEX, an expert system shell for multi-attribute decision support. W...
Tanja Arh, Borka Jerman-Blazic
JCP
2007
86views more  JCP 2007»
13 years 4 months ago
Taking Multiple-Choise Quiz by SMS on Mobile Phones Including Analyzing Property
— Recently Mobile Learning (M-Learning) has attracted much attention. Due to advantages of SMS (Short Messaging Service) on mobile phones we present a safe and protected method f...
Mohammad Shirali-Shahreza