Browsing Computer Science by Title
Now showing items 2061-2080 of 2087
-
What makes a good conversation? Challenges in designing truly conversational agents
(ACM, 2019-05)Conversational agents promise conversational interaction but fail to deliver. Efforts often emulate functional rules from human speech, without considering key characteristics that conversation must encapsulate. Given its ... -
What makes a great mobile digital art exhibition
(Hacettepe University Department of Information Management, 2011)Passive reception and consumption of art is a given, in our times. Artists produce. Spectators consume. At the nexus stands the curator who chooses the produce and the exhibitor who provides the space for consumers. This ... -
What Really Happened Here? Dealing with Uncertainty in the Book of Distance: A Critical Historiography Perspective
(Springer Verlag, 2023)Uncertain cultural heritage presents a dilemma in its narrative representation. History seeks to push a grand narrative, at the expense of less convenient narratives. Critical historiographic approaches favor the consideration ... -
What we talk about when we talk about interactivity: Empowerment in public discourse
(2017)This study offers new insights into interactivity by examining its association with empowerment in public discourse. Using data from 20 years of newspaper coverage, a mixed methods analysis ... -
When TCP breaks: Delay- and Disruption- tolerant networking
(2006)The authors give an overview of current work on delay- and disruption-tolerant networking and review the overall architecture proposed by the Internet Research Task Force?s Delay Tolerant Networking Research Group.Their ... -
Where do "Soccer Moms" Come From? : Cognitive Constraints on Noun-Noun Compounding in English
(Trinity College Dublin, Department of Computer Science, 1996-12)Every year new noun-noun combinations enter the English language and become common parlance; compounds like "notebook computer" and "soccer mom". But, why is one pair of words chosen rather than another pair ? For ... -
Where's Waldo? - or - A taxonomy for thinking about location in pervasive computing
(Trinity College Dublin, Department of Computer Science, 2004-02-06)[Introduction] Virtually all pervasive computing systems use some form of location for affecting the system's behaviour. Location-based services are available commercially, albeit in a primitive form, from many mobile ... -
Who am I that Acts? The Use of Voice in Virtual Reality Narratives
(Springer, 2021)Self-identification is a key factor for the immersion of the VR interactive narrative player. Diegetic non-protagonist narrators, touched-up heterodiegetic narrations with internal focalization, and casting the player in ... -
Why didn't we spot that?
(IEEE, 2010)The Secure Sockets Layer (SSL) protocol and its standards-track successor, the Transport Layer Security (TLS) protocol, were developed more than a decade ago and have generally withstood scrutiny in that the protocols ... -
Why Don't We Encrypt Our Email?
(IEEE, 2009)Today, almost all the programs we use to send and receive email include support for strong security mechanisms that we can apply end-to-end. But we generally don't use those - why is that? In this article, the author briefly ... -
Why XLIFF and Why XLIFF 2?
(Editions Tradulex, Geneva, 2016) -
Windfall Scale, Wealth Consciousness and Social Proximity as Influences on Ultimatum Game Decisions
(IEEE, 2018)—The ultimatum game is a construct used to explore factors that influence decision making in economic reasoning. The game involves two players who asymmetrically encounter a windfall, but both knowing the amount of the ... -
WinkTalk: A Demonstration of a Multimodal Speech Synthesis Platform Linking Facial Expressions to Expressive Synthetic Voices
(Association for Computational Linguistics, 2012)This paper describes a demonstration of the WinkTalk system, which is a speech synthesis platform using expressive synthetic voices. With the help of a webcamera and facial expression analysis, the system allows the ... -
Wireless Background Noise in the Wi-Fi Spectrum
(IEEE, 2008) -
Wireless Communication Using Real-Time Extensions to the Linux Network Subsystem
(2006)Timely wireless communication is essential to allow real-time mobile applications, e.g., communication between mobile robots and intervehicle communication to be realized. The current IEEE 802.11 ad hoc protocol is ... -
Wireless Indoor Resource Optimisation meeting Prescribed UserCapacity Requirements
(2018)The optimal locations of transmitters in a building, that best meet the bandwidth requirements of all users, was studied in the past by a small number of authors. They used empirical path loss models to constrain an ... -
Women's Perspective on Using Tinder: A User Study of Gender Dynamics in a Mobile Device Application
(New York: ACM, 2017)Mobile applications expand possibilities for interaction and extend the boundaries of communication. Regarding online dating, Tinder is one of those applications that make it easier to connect people, and it brings out ... -
Wordnet enhanced automatic crossword generation
(The Global Wordnet Association, 2006)We report on a system for automatically gener- ating and displaying crosswords from a system manager supplied database of potential clues and corresponding words that index those clues. The system relies on the lexical ... -
Workflow - A Unifying technology for (Telecommunications) Operational Support Systems
(IEEE, 2000)A crucial issue facing Telecommunications Service Providers is the need to provide flexible, cost effective, management systems, which can rapidly adapt to changing customer requirements and inarket opportunities. A ... -
Workflow semantics of peer and service behaviour
(IEEE, 2008)In this paper we introduce SMoL, a simplified BPEL-like language for specifying peer and service behaviour in P2P systems. We define a transformational semantics of SMoL in terms of YAWL workflows, which enables the ...