Speech input is frequently claimed to offer great benefits in human-computer interaction, yet experimental comparisons (conducted over many years) of speech and keying as input media have produced ambiguous results. The sources of this a...
Simulated command and control experiments are described in which speech input, abbreviated command keying and full command keying are compared under dual-t...
Experimental comparisons of speech and competitor input media such as keying have, taken overall, produced equivocal results: this has usually been attribu...
A novel reduced-complexity near-optimal detection algorithm is proposed for enhancing the recent Coherently-detected Space-Time Shift Keying (CSTSK) scheme...
Motivated by the recent concept of Space-Time Shift Keying (STSK), we propose a novel cooperative STSK family, which is capable of achieving a flexible rat...
Performance of two-bit differential detection of Gaussian minimum-shift keying (GMSK) in a cellular mobile communication channel is theoretically analyzed....
Frequency-modulated differential chaos shift keying (FM-DCSK) is essentially a technique that combines modulation with a spread-spectrum property for commu...
Sensor network security has received much deserved attention in the last few years. Key management is at the heart of securing such networks. Key management schemes for sensor networks may be classified broadly into static and dynamic ke...
We investigated the differences between (a) copying and pasting text versus typed note-taking methods of constructing study notes simultaneously with (b) v...