Sciweavers

1517 search results - page 237 / 304
» Time and Location Based Services with Access Control
Sort
View
UIST
2010
ACM
14 years 7 months ago
Multitoe: high-precision interaction with back-projected floors based on high-resolution multi-touch input
Tabletop applications cannot display more than a few dozen on-screen objects. The reason is their limited size: tables cannot become larger than arm's length without giving u...
Thomas Augsten, Konstantin Kaefer, René Meu...
HPCC
2005
Springer
15 years 3 months ago
An Energy-Efficient Uni-scheduling Based on S-MAC in Wireless Sensor Network
S-MAC is a MAC (Medium Access Control) protocol as specialized for the wireless sensor network in order to sacrifice transmission delay and extend the working life of the whole sen...
Tae-Seok Lee, Yuan Yang, Ki-Jeong Shin, Myong-Soon...
IPTPS
2004
Springer
15 years 3 months ago
Cluster Computing on the Fly: P2P Scheduling of Idle Cycles in the Internet
— Peer-to-peer computing, the harnessing of idle compute cycles throughout the Internet, offers exciting new research challenges in the converging domains of networking and distr...
Virginia Mary Lo, Daniel Zappala, Dayi Zhou, Yuhon...
JSAC
2007
180views more  JSAC 2007»
14 years 9 months ago
A Cross-Layer Approach for WLAN Voice Capacity Planning
— This paper presents an analytical approach to determining the maximum number of on/off voice flows that can be supported over a wireless local area network (WLAN), under a qua...
Yu Cheng, Xinhua Ling, Wei Song, Lin X. Cai, Weihu...
IWINAC
2009
Springer
15 years 2 months ago
Results of an Adaboost Approach on Alzheimer's Disease Detection on MRI
Abstract. In this paper we explore the use of the Voxel-based Morphometry (VBM) detection clusters to guide the feature extraction processes for the detection of Alzheimer's d...
Alexandre Savio, Maite García-Sebasti&aacut...