Sciweavers

293 search results - page 39 / 59
» User Interface Requirements for Authentication of Communicat...
Sort
View
133
Voted
CCS
2008
ACM
15 years 5 months ago
Online subscriptions with anonymous access
Online privacy is an increasingly important problem, as many services are now offered in a digital form. Privacy (or the lack thereof) is of a special concern in subscriptions to ...
Marina Blanton
130
Voted
NETGAMES
2006
ACM
15 years 9 months ago
Telebuddies on the move: social stitching to enhance the networked gaming experience
In this paper we report on our work to enable “laid-back” social interactions using television as a primary interaction medium and mobile devices that participate as a seconda...
Kris Luyten, Kristof Thys, Steven Huypens, Karin C...
145
Voted
ICC
2009
IEEE
162views Communications» more  ICC 2009»
15 years 10 months ago
Distributed Uplink Signal Processing of Cooperating Base Stations Based on IQ Sample Exchange
—Cellular systems in general suffer from co-channel interference, when simultaneous transmissions in other cells use the same physical resources. In order to mitigate such co-cha...
Christian Hoymann, Laetitia Falconetti, Rohit Gupt...
AAAI
1994
15 years 4 months ago
An Experiment in the Design of Software Agents
We describe a bottom-up approach to the design of software agents. We built and tested an agent system that addresses the real-world problem of handling the activities involved in...
Henry A. Kautz, Bart Selman, Michael H. Coen, Stev...
137
Voted
HPDC
2008
IEEE
15 years 10 months ago
XenLoop: a transparent high performance inter-vm network loopback
Advances in virtualization technology have focused mainly on strengthening the isolation barrier between virtual machines (VMs) that are co-resident within a single physical machi...
Jian Wang, Kwame-Lante Wright, Kartik Gopalan