Results 1 - 10
of
3,772
7User Voice Assistance Tool for Teleoperation
"... Summary. A teleoperation tool that allows to interact with the remote environment in a more comfortable and flexible way is presented in this chapter. Working over a clas-sical teleoperation environment, the goal is to reach a higher level of abstraction in the user commands. The tool allows the ope ..."
Abstract
- Add to MetaCart
Summary. A teleoperation tool that allows to interact with the remote environment in a more comfortable and flexible way is presented in this chapter. Working over a clas-sical teleoperation environment, the goal is to reach a higher level of abstraction in the user commands. The tool allows
Information Filtering and Information Retrieval: Two Sides of the Same Coin
- COMMUNICATIONS OF THE ACM
, 1992
"... Information filtering systems are designed for unstructured or semistructured data, as opposed to database applications, which use very structured data. The systems also deal primarily with textual information, but they may also entail images, voice, video or other data types that are part of multim ..."
Abstract
-
Cited by 441 (6 self)
- Add to MetaCart
Information filtering systems are designed for unstructured or semistructured data, as opposed to database applications, which use very structured data. The systems also deal primarily with textual information, but they may also entail images, voice, video or other data types that are part
Efficient power control via pricing in wireless data networks
- IEEE Trans. on Commun
, 2002
"... Abstract—A major challenge in the operation of wireless communications systems is the efficient use of radio resources. One important component of radio resource management is power control, which has been studied extensively in the context of voice communications. With the increasing demand for wir ..."
Abstract
-
Cited by 339 (8 self)
- Add to MetaCart
Abstract—A major challenge in the operation of wireless communications systems is the efficient use of radio resources. One important component of radio resource management is power control, which has been studied extensively in the context of voice communications. With the increasing demand
An analysis of the skype peer-to-peer Internet telephony protocol
, 2004
"... Abstract—Skype is a peer-to-peer VoIP client developed in 2003 by the organization who created Kazaa. Skype claims that it can work almost seamlessly across NATs and firewalls and has better voice quality than other VoIP clients. It encrypts calls end-to-end, and stores user information in a decentr ..."
Abstract
-
Cited by 304 (6 self)
- Add to MetaCart
Abstract—Skype is a peer-to-peer VoIP client developed in 2003 by the organization who created Kazaa. Skype claims that it can work almost seamlessly across NATs and firewalls and has better voice quality than other VoIP clients. It encrypts calls end-to-end, and stores user information in a
iPlane: An information plane for distributed services
- In OSDI 2006
"... Abstract — In this paper, we present the design, implementation, and evaluation of the iPlane, a scalable service providing accurate predictions of Internet path performance for emerging overlay services. Unlike the more common black box latency prediction techniques in use today, the iPlane builds ..."
Abstract
-
Cited by 297 (25 self)
- Add to MetaCart
and utility of the iPlane service by applying it to several representative overlay services in use today: content distribution, swarming peer-to-peer filesharing, and voice-over-IP. In each case, we observe that using iPlane’s predictions leads to a significant improvement in end user performance. 1
Scalable routing strategies for ad hoc wireless networks
- IEEE JSAC
, 1999
"... In this paper, we consider a large population of mobile stations that are interconnected by a multihop wireless network. The applications of this wireless infrastructure range from ad hoc networking (e.g., collaborative, distributed computing) to disaster recovery (e.g., fire, flood, earthquake), l ..."
Abstract
-
Cited by 261 (15 self)
- Add to MetaCart
), law enforcement (e.g., crowd control, search-and-rescue), and military (automated battlefield). Key characteristics of this system are the large number of users, their mobility, and the need to operate without the support of a fixed (wired or wireless) infrastructure. The last feature sets this system
Cross-Layer Design for Wireless Networks
- IEEE Communications Magazine
, 2003
"... As the cellular and PCS world collides with Wireless LANs and Internet-based packet data, new networking approaches will support the integration of voice and data on the composite infrastructure of cellular base stations and Ethernet-based wireless access points. This paper highlights some of the pa ..."
Abstract
-
Cited by 254 (2 self)
- Add to MetaCart
As the cellular and PCS world collides with Wireless LANs and Internet-based packet data, new networking approaches will support the integration of voice and data on the composite infrastructure of cellular base stations and Ethernet-based wireless access points. This paper highlights some
Voice communication across the Internet: a network voice terminal
, 1992
"... Voice conferencing has attracted interest as a useful and viable rst real-time application on the Internet. This report describes Nevot a network voice terminal meant to support multiple concurrent both two-party and multi-party conferences on top of a variety of transport protocols and using audio ..."
Abstract
-
Cited by 128 (18 self)
- Add to MetaCart
Voice conferencing has attracted interest as a useful and viable rst real-time application on the Internet. This report describes Nevot a network voice terminal meant to support multiple concurrent both two-party and multi-party conferences on top of a variety of transport protocols and using audio
An Open Agent Architecture
, 1994
"... The goal of this ongoing project is to develop an open agent architecture and accompanying user interface for networked desktop and handheld machines. The system we are building should support distributed execution of a user's requests, interoperabilityofmultiple application subsystems, ad ..."
Abstract
-
Cited by 224 (32 self)
- Add to MetaCart
The goal of this ongoing project is to develop an open agent architecture and accompanying user interface for networked desktop and handheld machines. The system we are building should support distributed execution of a user's requests, interoperabilityofmultiple application subsystems
UIML: an appliance-independent xml user interface language
- In Computer Networks 31, Elsevier Science
, 1999
"... Abstract Today's Internet appliances feature user interface technologies almost unknown a few years ago: touch screens, styli, handwriting and voice recognition, speech synthesis, tiny screens, and more. This richness creates problems. First, different appliances use different languages: WML f ..."
Abstract
-
Cited by 143 (5 self)
- Add to MetaCart
Abstract Today's Internet appliances feature user interface technologies almost unknown a few years ago: touch screens, styli, handwriting and voice recognition, speech synthesis, tiny screens, and more. This richness creates problems. First, different appliances use different languages: WML
Results 1 - 10
of
3,772