Browsing Computer Science (Scholarly Publications) by Title
Now showing items 1359-1378 of 1381
-
What Really Happened Here? Dealing with Uncertainty in the Book of Distance: A Critical Historiography Perspective
(Springer Verlag, 2023)Uncertain cultural heritage presents a dilemma in its narrative representation. History seeks to push a grand narrative, at the expense of less convenient narratives. Critical historiographic approaches favor the consideration ... -
What we talk about when we talk about interactivity: Empowerment in public discourse
(2017)This study offers new insights into interactivity by examining its association with empowerment in public discourse. Using data from 20 years of newspaper coverage, a mixed methods analysis ... -
When TCP breaks: Delay- and Disruption- tolerant networking
(2006)The authors give an overview of current work on delay- and disruption-tolerant networking and review the overall architecture proposed by the Internet Research Task Force?s Delay Tolerant Networking Research Group.Their ... -
Who am I that Acts? The Use of Voice in Virtual Reality Narratives
(Springer, 2021)Self-identification is a key factor for the immersion of the VR interactive narrative player. Diegetic non-protagonist narrators, touched-up heterodiegetic narrations with internal focalization, and casting the player in ... -
Why didn't we spot that?
(IEEE, 2010)The Secure Sockets Layer (SSL) protocol and its standards-track successor, the Transport Layer Security (TLS) protocol, were developed more than a decade ago and have generally withstood scrutiny in that the protocols ... -
Why Don't We Encrypt Our Email?
(IEEE, 2009)Today, almost all the programs we use to send and receive email include support for strong security mechanisms that we can apply end-to-end. But we generally don't use those - why is that? In this article, the author briefly ... -
Why XLIFF and Why XLIFF 2?
(Editions Tradulex, Geneva, 2016) -
Windfall Scale, Wealth Consciousness and Social Proximity as Influences on Ultimatum Game Decisions
(IEEE, 2018)—The ultimatum game is a construct used to explore factors that influence decision making in economic reasoning. The game involves two players who asymmetrically encounter a windfall, but both knowing the amount of the ... -
WinkTalk: A Demonstration of a Multimodal Speech Synthesis Platform Linking Facial Expressions to Expressive Synthetic Voices
(Association for Computational Linguistics, 2012)This paper describes a demonstration of the WinkTalk system, which is a speech synthesis platform using expressive synthetic voices. With the help of a webcamera and facial expression analysis, the system allows the ... -
Wireless Background Noise in the Wi-Fi Spectrum
(IEEE, 2008) -
Wireless Communication Using Real-Time Extensions to the Linux Network Subsystem
(2006)Timely wireless communication is essential to allow real-time mobile applications, e.g., communication between mobile robots and intervehicle communication to be realized. The current IEEE 802.11 ad hoc protocol is ... -
Wireless Indoor Resource Optimisation meeting Prescribed UserCapacity Requirements
(2018)The optimal locations of transmitters in a building, that best meet the bandwidth requirements of all users, was studied in the past by a small number of authors. They used empirical path loss models to constrain an ... -
Women's Perspective on Using Tinder: A User Study of Gender Dynamics in a Mobile Device Application
(New York: ACM, 2017)Mobile applications expand possibilities for interaction and extend the boundaries of communication. Regarding online dating, Tinder is one of those applications that make it easier to connect people, and it brings out ... -
Wordnet enhanced automatic crossword generation
(The Global Wordnet Association, 2006)We report on a system for automatically gener- ating and displaying crosswords from a system manager supplied database of potential clues and corresponding words that index those clues. The system relies on the lexical ... -
Workflow - A Unifying technology for (Telecommunications) Operational Support Systems
(IEEE, 2000)A crucial issue facing Telecommunications Service Providers is the need to provide flexible, cost effective, management systems, which can rapidly adapt to changing customer requirements and inarket opportunities. A ... -
Workflow semantics of peer and service behaviour
(IEEE, 2008)In this paper we introduce SMoL, a simplified BPEL-like language for specifying peer and service behaviour in P2P systems. We define a transformational semantics of SMoL in terms of YAWL workflows, which enables the ... -
X509Cloud - Framework for a Ubiquitous PKI
(2017)The SSL protocol has been widely used for verifying digital identities and to secure Internet traffic since the early days of the web. Although X.509 certificates have been in existence for more than two decades, individual ... -
An XG-PON Module for the NS-3 Network Simulator
(2013)10-Gigabit-capable Passive Optical Network (XG-PON), one of the latest standards of optical access networks, is regar ded as one of the key technologies for future Internet access net - works. In this paper, we propose ... -
XYZ Privacy
(2018)Future autonomous vehicles will generate, collect, aggregate and consume significant volumes of data as key gateway devices in emerging Internet of Things scenarios. While vehicles are widely accepted as one of the most ... -
YABS: A domain-specific language for pervasive computing based on stigmergy
(2006)This paper presents YABS, a novel domain-specific language for defining entity behavior in pervasive computing environments. The programming model of YABS is inspired by nature and, in particular, the observations made ...