Now showing items 2065-2084 of 2087

    • When TCP breaks: Delay- and Disruption- tolerant networking 

      FARRELL, STEPHEN; CAHILL, VINNY (2006)
      The authors give an overview of current work on delay- and disruption-tolerant networking and review the overall architecture proposed by the Internet Research Task Force?s Delay Tolerant Networking Research Group.Their ...
    • Where do "Soccer Moms" Come From? : Cognitive Constraints on Noun-Noun Compounding in English 

      Keane, Mark T.; Costello, Fintan (Trinity College Dublin, Department of Computer Science, 1996-12)
      Every year new noun-noun combinations enter the English language and become common parlance; compounds like "notebook computer" and "soccer mom". But, why is one pair of words chosen rather than another pair ? For ...
    • Where's Waldo? - or - A taxonomy for thinking about location in pervasive computing 

      Dobson, Simon (Trinity College Dublin, Department of Computer Science, 2004-02-06)
      [Introduction] Virtually all pervasive computing systems use some form of location for affecting the system's behaviour. Location-based services are available commercially, albeit in a primitive form, from many mobile ...
    • Who am I that Acts? The Use of Voice in Virtual Reality Narratives 

      Haahr, Mads; Barbara, Jonathan (Springer, 2021)
      Self-identification is a key factor for the immersion of the VR interactive narrative player. Diegetic non-protagonist narrators, touched-up heterodiegetic narrations with internal focalization, and casting the player in ...
    • Why didn't we spot that? 

      FARRELL, STEPHEN (IEEE, 2010)
      The Secure Sockets Layer (SSL) protocol and its standards-track successor, the Transport Layer Security (TLS) protocol, were developed more than a decade ago and have generally withstood scrutiny in that the protocols ...
    • Why Don't We Encrypt Our Email? 

      FARRELL, STEPHEN (IEEE, 2009)
      Today, almost all the programs we use to send and receive email include support for strong security mechanisms that we can apply end-to-end. But we generally don't use those - why is that? In this article, the author briefly ...
    • Why XLIFF and Why XLIFF 2? 

      FILIP, DAVID (Editions Tradulex, Geneva, 2016)
    • Windfall Scale, Wealth Consciousness and Social Proximity as Influences on Ultimatum Game Decisions 

      Vogel, Carl (IEEE, 2018)
      —The ultimatum game is a construct used to explore factors that influence decision making in economic reasoning. The game involves two players who asymmetrically encounter a windfall, but both knowing the amount of the ...
    • WinkTalk: A Demonstration of a Multimodal Speech Synthesis Platform Linking Facial Expressions to Expressive Synthetic Voices 

      Cabral, Joao; Székely, Éva; Ahmed, Zeeshan; Carson-Berndsen, Julie (Association for Computational Linguistics, 2012)
      This paper describes a demonstration of the WinkTalk system, which is a speech synthesis platform using expressive synthetic voices. With the help of a webcamera and facial expression analysis, the system allows the ...
    • Wireless Background Noise in the Wi-Fi Spectrum 

      Bernath, G.; Steichen, B.; FU, BO; STEICHEN, BEN; WEBER, STEFAN (IEEE, 2008)
    • Wireless Communication Using Real-Time Extensions to the Linux Network Subsystem 

      CAHILL, VINNY (2006)
      Timely wireless communication is essential to allow real-time mobile applications, e.g., communication between mobile robots and intervehicle communication to be realized. The current IEEE 802.11 ad hoc protocol is ...
    • Wireless Indoor Resource Optimisation meeting Prescribed UserCapacity Requirements 

      Kenny, Eamonn; O Nuallain, Eamonn (2018)
      The optimal locations of transmitters in a building, that best meet the bandwidth requirements of all users, was studied in the past by a small number of authors. They used empirical path loss models to constrain an ...
    • Women's Perspective on Using Tinder: A User Study of Gender Dynamics in a Mobile Device Application 

      VOGEL, CARL (New York: ACM, 2017)
      Mobile applications expand possibilities for interaction and extend the boundaries of communication. Regarding online dating, Tinder is one of those applications that make it easier to connect people, and it brings out ...
    • Wordnet enhanced automatic crossword generation 

      VOGEL, CARL (The Global Wordnet Association, 2006)
      We report on a system for automatically gener- ating and displaying crosswords from a system manager supplied database of potential clues and corresponding words that index those clues. The system relies on the lexical ...
    • Workflow - A Unifying technology for (Telecommunications) Operational Support Systems 

      WADE, VINCENT PATRICK (IEEE, 2000)
      A crucial issue facing Telecommunications Service Providers is the need to provide flexible, cost effective, management systems, which can rapidly adapt to changing customer requirements and inarket opportunities. A ...
    • Workflow semantics of peer and service behaviour 

      POPESCU, RAZVAN (IEEE, 2008)
      In this paper we introduce SMoL, a simplified BPEL-like language for specifying peer and service behaviour in P2P systems. We define a transformational semantics of SMoL in terms of YAWL workflows, which enables the ...
    • X509Cloud - Framework for a Ubiquitous PKI 

      Weber, Stefan; Tewari, Hitesh; Hughes, Arthur; Barry, Tomas (2017)
      The SSL protocol has been widely used for verifying digital identities and to secure Internet traffic since the early days of the web. Although X.509 certificates have been in existence for more than two decades, individual ...
    • An XG-PON Module for the NS-3 Network Simulator 

      Ruffini, Marco; Doyle, Linda; Marchetti, Nicola (2013)
      10-Gigabit-capable Passive Optical Network (XG-PON), one of the latest standards of optical access networks, is regar ded as one of the key technologies for future Internet access net - works. In this paper, we propose ...
    • XYZ Privacy 

      Mc Goldrick, Ciaran; Joy, Josh; Gray, Dylan; Gerla, Mario (2018)
      Future autonomous vehicles will generate, collect, aggregate and consume significant volumes of data as key gateway devices in emerging Internet of Things scenarios. While vehicles are widely accepted as one of the most ...
    • YABS: A domain-specific language for pervasive computing based on stigmergy 

      CAHILL, VINNY (2006)
      This paper presents YABS, a novel domain-specific language for defining entity behavior in pervasive computing environments. The programming model of YABS is inspired by nature and, in particular, the observations made ...