Sciweavers

10044 search results - page 1938 / 2009
» Authentication in Wireless Networks
Sort
View
WIOPT
2005
IEEE
15 years 9 months ago
Minimum Energy Transmission Scheduling Subject to Deadline Constraints
We consider the problem of transmission scheduling of data over a wireless fading channel with hard deadline constraints. Our system consists of N users, each with a fixed amount...
Alessandro Tarello, Jun Sun 0007, Murtaza Zafer, E...
ACMACE
2005
ACM
15 years 9 months ago
Interactive three-dimensional rendering on mobile computer devices
We present a client/server system that is able to display 3D scenes on handheld devices. This kind of devices have important restrictions of memory and computing power. Therefore,...
Javier Lluch, Rafael Gaitán, Emilio Camahor...
MM
2005
ACM
93views Multimedia» more  MM 2005»
15 years 9 months ago
The multimedia challenges raised by pervasive games
Pervasive gaming is a new form of multimedia entertainment that extends the traditional computer gaming experience out into the real world. Through a combination of personal devic...
Mauricio Capra, Milena Radenkovic, Steve Benford, ...
MM
2005
ACM
147views Multimedia» more  MM 2005»
15 years 9 months ago
Natural video browsing
In this demonstration, we show a novel system, Video Booklet, which enables nature personal video browsing and searching. Firstly representative thumbnails of video segments are s...
Cai-Zhi Zhu, Tao Mei, Xian-Sheng Hua
SIGDOC
2005
ACM
15 years 9 months ago
Sensorium games: usability considerations for pervasive gaming
The Sensorium family of games provides a platform and environment for multiplayer games in a pervasive environment. Each player is equipped with a mote, which (along with those of...
S. N. I. Mount, Elena I. Gaura, Robert M. Newman
« Prev « First page 1938 / 2009 Last » Next »