Sciweavers

4899 search results - page 677 / 980
» Robust normative systems
Sort
View
HICSS
2007
IEEE
109views Biometrics» more  HICSS 2007»
15 years 11 months ago
Fine-Tuning the Human-Computer Interface: Verbal versus Keyboard Input in an Idea Generation Context
Voice recognition technologies are rapidly evolving to help humans interact with computers more efficiently and effectively. Despite their potential advantages, their impact on sy...
Jay J. H. Jung, Clayton A. Looney, Joseph S. Valac...
ICC
2007
IEEE
128views Communications» more  ICC 2007»
15 years 11 months ago
Supporting the Sink Mobility: a Case Study for Wireless Sensor Networks
— This paper deals with a system level design solution to support information gathering in the presence of a mobile querying node that experiences frequent disconnections from a ...
David Tacconi, Iacopo Carreras, Daniele Miorandi, ...
ICPP
2007
IEEE
15 years 11 months ago
Defending P2Ps from Overlay Flooding-based DDoS
A flooding-based search mechanism is often used in unstructured P2P systems. Although a flooding-based search mechanism is simple and easy to implement, it is vulnerable to overla...
Yunhao Liu, Xiaomei Liu, Chen Wang, Li Xiao
ICRA
2007
IEEE
108views Robotics» more  ICRA 2007»
15 years 11 months ago
Automated Tool Handling for the Trauma Pod Surgical Robot
— In order to enable robotic surgery without human assistance, a means must be developed to change tools. As part of the larger Trauma Pod Project, we developed the Tool Rack Sub...
Diana C. W. Friedman, Jesse Dosher, Tim Kowalewski...
P2P
2007
IEEE
132views Communications» more  P2P 2007»
15 years 11 months ago
The Design and Evaluation of Techniques for Route Diversity in Distributed Hash Tables
To achieve higher efficiency over their unstructured counterparts, structured peer-to-peer systems hold each node responsible for serving a specified set of keys and correctly r...
Cyrus Harvesf, Douglas M. Blough