Sciweavers

14078 search results - page 2558 / 2816
» Design and Analysis of Computer Algorithms
Sort
View
LANC
2009
ACM
158views Education» more  LANC 2009»
15 years 10 months ago
Enhancements to the opinion model for video-telephony applications
In this paper, we show how the proposed model in ITU-T Recommendation G.1070 “Opinion model for video-telephony applications” cannot model properly the perceptual video qualit...
Jose Joskowicz, José Carlos López-Ar...
MOBIWAC
2009
ACM
15 years 10 months ago
The sociable traveller: human travelling patterns in social-based mobility
Understanding how humans move is a key factor for the design and evaluation of networking protocols and mobility management solutions in mobile networks. This is particularly true...
Chiara Boldrini, Marco Conti, Andrea Passarella
ICCS
2007
Springer
15 years 10 months ago
Enhanced Situational Awareness: Application of DDDAS Concepts to Emergency and Disaster Management
Abstract. We describe a prototype emergency and disaster information system designed and implemented using DDDAS concepts. The system is designed to use real-time cell phone callin...
Gregory R. Madey, Albert-László Bara...
HRI
2006
ACM
15 years 10 months ago
Daily HRI evaluation at a classroom environment: reports from dance interaction experiments
The design and development of social robots that interact and assist people in daily life requires moving into unconstrained daily-life environments. This presents unexplored meth...
Fumihide Tanaka, Javier R. Movellan, Bret Fortenbe...
WS
2006
ACM
15 years 10 months ago
Modeling Ad-hoc rushing attack in a negligibility-based security framework
In this paper, we propose a formal notion of network security for ad hoc networks. We adopt a probabilistic security framework, that is, security is defined by a polynomially bou...
Jiejun Kong, Xiaoyan Hong, Mario Gerla
« Prev « First page 2558 / 2816 Last » Next »