Sciweavers

2024 search results - page 366 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
MM
1999
ACM
176views Multimedia» more  MM 1999»
15 years 6 months ago
Modeling focus of attention for meeting indexing
—A user’s focus of attention plays an important role in human–computer interaction applications, such as a ubiquitous computing environment and intelligent space, where the u...
Rainer Stiefelhagen, Jie Yang, Alex Waibel
MSWIM
2005
ACM
15 years 7 months ago
A controlled-access scheduling mechanism for QoS provisioning in IEEE 802.11e wireless LANs
Wireless Local Area Networks (WLAN) are being deployed at a rapid pace and in different environments. As a result, the demand for supporting a diverse range of applications over w...
Yaser Pourmohammadi Fallah, Hussein M. Alnuweiri
IMC
2004
ACM
15 years 7 months ago
Robust synchronization of software clocks across the internet
Accurate, reliable timestamping which is also convenient and inexpensive is needed in many important areas including real-time network applications and network measurement. Recent...
Darryl Veitch, Satish Babu Korada, Attila Pá...
NCA
2007
IEEE
15 years 8 months ago
Towards IQ-Appliances: Quality-awareness in Information Virtualization
Our research addresses two important problems that arise in modern large-scale distributed systems: (1) the necessity to virtualize their data flows by applying actions such as ï...
Radhika Niranjan, Ada Gavrilovska, Karsten Schwan,...
DSRT
1999
IEEE
15 years 6 months ago
Distributed Interaction in Virtual Spaces
Virtual spaces based on the metaphor of "shared network places" are becoming a well accepted implementation approach for multiuser, multimedia, distributed cooperative w...
Alois Ferscha, James Johnson