Sciweavers

509 search results - page 39 / 102
» clear 2006
Sort
View
RIA
2008
104views more  RIA 2008»
14 years 9 months ago
Scatterbox: Context-Aware Message Management
Applications that rely on mobile devices for user interaction must be mindful of the user's limited attention, which will typically be split between several competing tasks. C...
Stephen Knox, Ross Shannon, Lorcan Coyle, Adrian K...
INFFUS
2006
103views more  INFFUS 2006»
14 years 9 months ago
Information fusion approaches to the automatic pronunciation of print by analogy
Automatic pronunciation of words from their spelling alone is a hard computational problem, especially for languages like English and French where there is only a partially consis...
Robert I. Damper, Yannick Marchand
RTS
2006
106views more  RTS 2006»
14 years 9 months ago
Q-SCA: Incorporating QoS support into software communications architecture for SDR waveform processing
The Software Communications Architecture (SCA) defined by Joint Tactical Radio Systems (JTRS) is the de facto standard middleware currently adopted by the Software Defined Radio (...
Jaesoo Lee, Saehwa Kim, Jiyong Park, Seongsoo Hong
IVS
2002
106views more  IVS 2002»
14 years 9 months ago
Pixel bar charts: a visualization technique for very large multi-attribute data sets?
Simple presentation graphics are intuitive and easy-to-use, but show only highly aggregated data presenting only a very small number of data values (as in the case of bar charts) ...
Daniel A. Keim, Ming C. Hao, Umeshwar Dayal, Meich...
IJSN
2006
140views more  IJSN 2006»
14 years 9 months ago
Load-balanced key establishment methodologies in wireless sensor networks
: Wireless Sensor Networks (WSN) pose a need for dynamically establishing a secret key joint to a group of nodes. Elliptic Curve Cryptography (ECC) has emerged as a suitable public...
Ortal Arazi, Hairong Qi