Displaying 5621 - 5630 of 37878

To support Industry 4.0 applications with haptics and human-machine interaction, 6G requires a new framework that is fully autonomous, visual, and interactive.

Connecting people is the ultimate goal of telecommunication.

Conversational agents are rich in content today. However, they are entirely oblivious to user situational context, limiting their ability to adapt their response and interaction style.

An automated offline design process for optimized cross-layer schedulers can produce augmented scheduling algorithms tailored to a target deployment scenario.

We say that a computer program augments the analyst if it can infer facts that are implicit in existing information, but that may be relatively difficult for a human to infer.

ICN is an architecture proposed for the evolution of the Internet.

The possible ground signatures of FTE's have been studied by Goertz et al. (1985), Southwood (1987), and Lanzerotti et al. (1986). The impulsive magnetic variations discussed by Lanzerotti et al.

In this paper we introduce a way to preserve end-to-end confidentiality while authenticating transversal of network elements with as many intervening review points as needed.

Public camera feeds are increasingly being opened to use by multiple authorities (e.g., police, fire, traffic) as well as to the public.

The one-time pad is an encryption technique that is proven to be unbreakable by an eavesdropper.