Sort by: Order: Results:

Now showing items 1292-1306 of 1306

  • Windfall Scale, Wealth Consciousness and Social Proximity as Influences on Ultimatum Game Decisions 

    Vogel, Carl (IEEE, 2018)
    —The ultimatum game is a construct used to explore factors that influence decision making in economic reasoning. The game involves two players who asymmetrically encounter a windfall, but both knowing the amount of the ...
  • WinkTalk: A Demonstration of a Multimodal Speech Synthesis Platform Linking Facial Expressions to Expressive Synthetic Voices 

    Cabral, Joao; Székely, Éva; Ahmed, Zeeshan; Carson-Berndsen, Julie (Association for Computational Linguistics, 2012)
    This paper describes a demonstration of the WinkTalk system, which is a speech synthesis platform using expressive synthetic voices. With the help of a webcamera and facial expression analysis, the system allows the ...
  • Wireless Background Noise in the Wi-Fi Spectrum 

    Bernath, G.; Steichen, B.; FU, BO; STEICHEN, BEN; WEBER, STEFAN (IEEE, 2008)
  • Wireless Communication Using Real-Time Extensions to the Linux Network Subsystem 

    CAHILL, VINNY (2006)
    Timely wireless communication is essential to allow real-time mobile applications, e.g., communication between mobile robots and intervehicle communication to be realized. The current IEEE 802.11 ad hoc protocol is ...
  • Wireless Indoor Resource Optimisation meeting Prescribed UserCapacity Requirements 

    Kenny, Eamonn; O Nuallain, Eamonn (2018)
    The optimal locations of transmitters in a building, that best meet the bandwidth requirements of all users, was studied in the past by a small number of authors. They used empirical path loss models to constrain an ...
  • Women's Perspective on Using Tinder: A User Study of Gender Dynamics in a Mobile Device Application 

    VOGEL, CARL (New York: ACM, 2017)
    Mobile applications expand possibilities for interaction and extend the boundaries of communication. Regarding online dating, Tinder is one of those applications that make it easier to connect people, and it brings out ...
  • Wordnet enhanced automatic crossword generation 

    VOGEL, CARL (The Global Wordnet Association, 2006)
    We report on a system for automatically gener- ating and displaying crosswords from a system manager supplied database of potential clues and corresponding words that index those clues. The system relies on the lexical ...
  • Workflow - A Unifying technology for (Telecommunications) Operational Support Systems 

    WADE, VINCENT PATRICK (IEEE, 2000)
    A crucial issue facing Telecommunications Service Providers is the need to provide flexible, cost effective, management systems, which can rapidly adapt to changing customer requirements and inarket opportunities. A ...
  • Workflow semantics of peer and service behaviour 

    POPESCU, RAZVAN (IEEE, 2008)
    In this paper we introduce SMoL, a simplified BPEL-like language for specifying peer and service behaviour in P2P systems. We define a transformational semantics of SMoL in terms of YAWL workflows, which enables the ...
  • X509Cloud - Framework for a Ubiquitous PKI 

    Weber, Stefan; Tewari, Hitesh; Hughes, Arthur; Barry, Tomas (2017)
    The SSL protocol has been widely used for verifying digital identities and to secure Internet traffic since the early days of the web. Although X.509 certificates have been in existence for more than two decades, individual ...
  • An XG-PON Module for the NS-3 Network Simulator 

    Ruffini, Marco; Doyle, Linda; Marchetti, Nicola (2013)
    10-Gigabit-capable Passive Optical Network (XG-PON), one of the latest standards of optical access networks, is regar ded as one of the key technologies for future Internet access net - works. In this paper, we propose ...
  • XYZ Privacy 

    Mc Goldrick, Ciaran; Joy, Josh; Gray, Dylan; Gerla, Mario (2018)
    Future autonomous vehicles will generate, collect, aggregate and consume significant volumes of data as key gateway devices in emerging Internet of Things scenarios. While vehicles are widely accepted as one of the most ...
  • YABS: A domain-specific language for pervasive computing based on stigmergy 

    CAHILL, VINNY (2006)
    This paper presents YABS, a novel domain-specific language for defining entity behavior in pervasive computing environments. The programming model of YABS is inspired by nature and, in particular, the observations made ...
  • The ZRTP Protocol - Analysis on the Diffie-Hellman mode 

    BRESCIANI, RICCARDO (2009)
    ZRTP is a key agreement protocol by Philip Zimmermann, Alan Johnston and Jon Callas, which relies on a Di e-Hellman exchange to generate SRTP session parameters, providing con dentiality and protecting against Man-in-the-Middle ...
  • Untitled 

    KENNY, EAMONN (2000)
    The increase in mobile communications traffic has led to heightened interest in the use of deterministic propagation methods together with digital building and terrain databases for propagation prediction in urban areas. ...