Sciweavers

2454 search results - page 342 / 491
» Privacy in the Information and Communications Technologies
Sort
View
TON
2012
13 years 17 days ago
Opportunistic Spectrum Access in Multiple-Primary-User Environments Under the Packet Collision Constraint
—Cognitive Radio (CR) technology has great potential to alleviate spectrum scarcity in wireless communications. It allows secondary users (SUs) to opportunistically access spectr...
Eric Jung, Xin Liu
CHI
2005
ACM
15 years 10 months ago
Patterns of media use in an activity-centric collaborative environment
This paper describes a new collaboration technology that is based on the support of lightweight, informally structured, opportunistic activities featuring heterogeneous threads of...
David R. Millen, Michael J. Muller, Werner Geyer, ...
HICSS
2009
IEEE
121views Biometrics» more  HICSS 2009»
15 years 5 months ago
Effects of Language Familiarity on e-Negotiation: Use of Native vs. Nonnative Language
This study explored the influence of language familiarity on persuasion behavior in e-negotiation. This was motivated by booming global e-business and the resulting popularity of ...
Hsiangchu Lai, Wan-Jung Lin, Gregory E. Kersten
82
Voted
GLOBECOM
2007
IEEE
15 years 4 months ago
Service Oriented Architecture (SOA) for Integration of Field Bus Systems
—The current trends in service consolidation over Internet Protocol (IP) also stimulates the integration of the industrial automation system with the information technology (IT) ...
Xiaohua Tian, Yu Cheng, Rose Qingyang Hu, Yi Qian
IWIC
2007
Springer
15 years 4 months ago
Cross-Cultural Study of Avatars' Facial Expressions and Design Considerations Within Asian Countries
Avatars are increasingly used to express our emotions in our online communications. Such avatars are used based on the assumption that avatar expressions are interpreted universall...
Tomoko Koda