Sciweavers

2244 search results - page 327 / 449
» Subjective Document Classification Using Network Analysis
Sort
View
IJMHCI
2011
249views more  IJMHCI 2011»
14 years 7 months ago
3D Talking-Head Interface to Voice-Interactive Services on Mobile Phones
We present a novel framework for easy creation of interactive, platform-independent voice-services with an animated 3D talking-head interface, on mobile phones. The framework supp...
Jirí Danihelka, Roman Hak, Lukas Kencl, Jir...
99
Voted
TPDS
2010
159views more  TPDS 2010»
14 years 11 months ago
Exploring In-Situ Sensing Irregularity in Wireless Sensor Networks
The circular sensing model has been widely used to estimate performance of sensing applications in existing analysis and simulations. While this model provides valuable high-level...
Joengmin Hwang, Tian He, Yongdae Kim
82
Voted
IWCMC
2010
ACM
15 years 5 months ago
Turbo packet combining techniques for multi-relay-assisted systems over multi-antenna broadband channels
This paper focuses on turbo packet combining techniques for multi-relay-assisted systems operating over multiple-input multiple-output (MIMO) broadband channel. Two packet combini...
Houda Chafnaji, Halim Yanikomeroglu, Tarik Ait-Idi...
122
Voted
ADHOCNOW
2009
Springer
15 years 1 months ago
Secure EPC Gen2 Compliant Radio Frequency Identification
The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard a de facto specification for inexpensive tags in the RFID industry. Recently three EPCGen2 complian...
Mike Burmester, Breno de Medeiros, Jorge Munilla, ...
90
Voted
CCS
2008
ACM
15 years 2 months ago
Dependent link padding algorithms for low latency anonymity systems
Low latency anonymity systems are susceptive to traffic analysis attacks. In this paper, we propose a dependent link padding scheme to protect anonymity systems from traffic analy...
Wei Wang 0002, Mehul Motani, Vikram Srinivasan