Sciweavers

3336 search results - page 561 / 668
» Communication Model to Support Rapid Application Development
Sort
View
ATAL
2007
Springer
15 years 10 months ago
On the robustness of preference aggregation in noisy environments
In an election held in a noisy environment, agents may unintentionally perturb the outcome by communicating faulty preferences. We investigate this setting by introducing a theore...
Ariel D. Procaccia, Jeffrey S. Rosenschein, Gal A....
IFIP
2003
Springer
15 years 9 months ago
Power-Saving in Wi-Fi Hotspots: An Analytical Study
Wi-Fi hotspots are one of the most promising scenarios for mobile computing. In this scenario, a very limiting factor is the scarcity of mobile-device energetic resources. Both har...
Giuseppe Anastasi, Marco Conti, Enrico Gregori, An...
ACSAC
2004
IEEE
15 years 7 months ago
Visualizing Enterprise-Wide Security (VIEWS)
This paper discusses VIEWS, a specification for building diagrams that describe the security features of systems. The authors' recent experience with providing security archi...
J. J. Brennan, Mindy Rudell, Donald B. Faatz, Cars...
CORR
2004
Springer
195views Education» more  CORR 2004»
15 years 3 months ago
Detecting User Engagement in Everyday Conversations
This paper presents a novel application of speech emotion recognition: estimation of the level of conversational engagement between users of a voice communication system. We begin...
Chen Yu, Paul M. Aoki, Allison Woodruff
MUE
2007
IEEE
111views Multimedia» more  MUE 2007»
15 years 10 months ago
Securing the Pharmaceutical Supply Chain using RFID
RFID technology has been applied to a number of applications. In [5], a protocol was described how to apply RFID to currency to provide integrity (e.g. reduce counterfeiting) whil...
Brian King, Xiaolan Zhang 0003