Now showing items 2068-2087 of 2087

    • Who am I that Acts? The Use of Voice in Virtual Reality Narratives 

      Haahr, Mads; Barbara, Jonathan (Springer, 2021)
      Self-identification is a key factor for the immersion of the VR interactive narrative player. Diegetic non-protagonist narrators, touched-up heterodiegetic narrations with internal focalization, and casting the player in ...
    • Why didn't we spot that? 

      FARRELL, STEPHEN (IEEE, 2010)
      The Secure Sockets Layer (SSL) protocol and its standards-track successor, the Transport Layer Security (TLS) protocol, were developed more than a decade ago and have generally withstood scrutiny in that the protocols ...
    • Why Don't We Encrypt Our Email? 

      FARRELL, STEPHEN (IEEE, 2009)
      Today, almost all the programs we use to send and receive email include support for strong security mechanisms that we can apply end-to-end. But we generally don't use those - why is that? In this article, the author briefly ...
    • Why XLIFF and Why XLIFF 2? 

      FILIP, DAVID (Editions Tradulex, Geneva, 2016)
    • Windfall Scale, Wealth Consciousness and Social Proximity as Influences on Ultimatum Game Decisions 

      Vogel, Carl (IEEE, 2018)
      —The ultimatum game is a construct used to explore factors that influence decision making in economic reasoning. The game involves two players who asymmetrically encounter a windfall, but both knowing the amount of the ...
    • WinkTalk: A Demonstration of a Multimodal Speech Synthesis Platform Linking Facial Expressions to Expressive Synthetic Voices 

      Cabral, Joao; Székely, Éva; Ahmed, Zeeshan; Carson-Berndsen, Julie (Association for Computational Linguistics, 2012)
      This paper describes a demonstration of the WinkTalk system, which is a speech synthesis platform using expressive synthetic voices. With the help of a webcamera and facial expression analysis, the system allows the ...
    • Wireless Background Noise in the Wi-Fi Spectrum 

      Bernath, G.; Steichen, B.; FU, BO; STEICHEN, BEN; WEBER, STEFAN (IEEE, 2008)
    • Wireless Communication Using Real-Time Extensions to the Linux Network Subsystem 

      CAHILL, VINNY (2006)
      Timely wireless communication is essential to allow real-time mobile applications, e.g., communication between mobile robots and intervehicle communication to be realized. The current IEEE 802.11 ad hoc protocol is ...
    • Wireless Indoor Resource Optimisation meeting Prescribed UserCapacity Requirements 

      Kenny, Eamonn; O Nuallain, Eamonn (2018)
      The optimal locations of transmitters in a building, that best meet the bandwidth requirements of all users, was studied in the past by a small number of authors. They used empirical path loss models to constrain an ...
    • Women's Perspective on Using Tinder: A User Study of Gender Dynamics in a Mobile Device Application 

      VOGEL, CARL (New York: ACM, 2017)
      Mobile applications expand possibilities for interaction and extend the boundaries of communication. Regarding online dating, Tinder is one of those applications that make it easier to connect people, and it brings out ...
    • Wordnet enhanced automatic crossword generation 

      VOGEL, CARL (The Global Wordnet Association, 2006)
      We report on a system for automatically gener- ating and displaying crosswords from a system manager supplied database of potential clues and corresponding words that index those clues. The system relies on the lexical ...
    • Workflow - A Unifying technology for (Telecommunications) Operational Support Systems 

      WADE, VINCENT PATRICK (IEEE, 2000)
      A crucial issue facing Telecommunications Service Providers is the need to provide flexible, cost effective, management systems, which can rapidly adapt to changing customer requirements and inarket opportunities. A ...
    • Workflow semantics of peer and service behaviour 

      POPESCU, RAZVAN (IEEE, 2008)
      In this paper we introduce SMoL, a simplified BPEL-like language for specifying peer and service behaviour in P2P systems. We define a transformational semantics of SMoL in terms of YAWL workflows, which enables the ...
    • X509Cloud - Framework for a Ubiquitous PKI 

      Weber, Stefan; Tewari, Hitesh; Hughes, Arthur; Barry, Tomas (2017)
      The SSL protocol has been widely used for verifying digital identities and to secure Internet traffic since the early days of the web. Although X.509 certificates have been in existence for more than two decades, individual ...
    • An XG-PON Module for the NS-3 Network Simulator 

      Ruffini, Marco; Doyle, Linda; Marchetti, Nicola (2013)
      10-Gigabit-capable Passive Optical Network (XG-PON), one of the latest standards of optical access networks, is regar ded as one of the key technologies for future Internet access net - works. In this paper, we propose ...
    • XYZ Privacy 

      Mc Goldrick, Ciaran; Joy, Josh; Gray, Dylan; Gerla, Mario (2018)
      Future autonomous vehicles will generate, collect, aggregate and consume significant volumes of data as key gateway devices in emerging Internet of Things scenarios. While vehicles are widely accepted as one of the most ...
    • YABS: A domain-specific language for pervasive computing based on stigmergy 

      CAHILL, VINNY (2006)
      This paper presents YABS, a novel domain-specific language for defining entity behavior in pervasive computing environments. The programming model of YABS is inspired by nature and, in particular, the observations made ...
    • Zohreh Khosrobeigi, Maria Koutsombogera, Carl Vogel 

      Vogel, Carl; Khosrobeigi, Zohreh; Koutsombogera, Maria (2023)
      This paper studies the relationship between conversational features related to gesture, conversational dominance, collaboration, and personality traits. Specifically, we examine the interaction of motion energy and factors ...
    • The ZRTP Protocol - Analysis on the Diffie-Hellman mode 

      BRESCIANI, RICCARDO (2009)
      ZRTP is a key agreement protocol by Philip Zimmermann, Alan Johnston and Jon Callas, which relies on a Di e-Hellman exchange to generate SRTP session parameters, providing con dentiality and protecting against Man-in-the-Middle ...
    • Untitled 

      KENNY, EAMONN (2000)
      The increase in mobile communications traffic has led to heightened interest in the use of deterministic propagation methods together with digital building and terrain databases for propagation prediction in urban areas. ...