Sciweavers

1436 search results - page 85 / 288
» Personalized Redirection of Communication
Sort
View
MM
2006
ACM
157views Multimedia» more  MM 2006»
15 years 9 months ago
Cyborglogging with camera phones: steps toward equiveillance
We present “equiveillance” as a conceptual framework for understanding the balance between surveillance and sousveillance. In addition to this conceptual framework we also pre...
Steve Mann, James Fung, Raymond Lo
ICC
2007
IEEE
103views Communications» more  ICC 2007»
15 years 9 months ago
On the Relay-Based Coverage Extension for Non-Conventional Multi-Hop Wireless Networks
Abstract— Due to the rapid growth of personal communications, it is now believed that multi-hop topologies will certainly play a key role in forthcoming wireless communications s...
Ramón Agüero, Johnny Choque, Luis Mu&n...
ESORICS
2010
Springer
15 years 1 months ago
Speaker Recognition in Encrypted Voice Streams
Transmitting voice communication over untrusted networks puts personal information at risk. Although voice streams are typically encrypted to prevent unwanted eavesdropping, additi...
Michael Backes, Goran Doychev, Markus Dürmuth...
134
Voted
ASSETS
2010
ACM
14 years 10 months ago
Utterance-based systems: organization and design of AAC interfaces
Electronic Augmented and Alternative Communication (AAC) systems provide a method for people with severe speech impairments to communicate by selecting what they desire to say, an...
Timothy J. Walsh
108
Voted
CICLING
2009
Springer
16 years 3 months ago
Has Computational Linguistics Become More Applied?
Where the field has been and where it is going? It is relatively easy to know where we have been, but harder (and more valuable) to know where we are going. The title of this paper...
Kenneth Ward Church