Sciweavers

MSWIM
2015
ACM
8 years 6 months ago
Deep Inspection of the Noise in WiFi Time-of-Flight Echo Techniques
Time-of-flight (ToF) echo techniques have been proposed to estimate the distance between a local and a target station using regular WiFi radio devices. As of today, there is litt...
Domenico Giustiniano, Theodoros Bourchas, Maciej B...
MSWIM
2015
ACM
8 years 6 months ago
Two Hops or More: On Hop-Limited Search in Opportunistic Networks
While there is a drastic shift from host-centric networking to content-centric networking, how to locate and retrieve the relevant content efficiently, especially in a mobile netw...
Suzan Bayhan, Esa Hyytiä, Jussi Kangasharju, ...
MSWIM
2015
ACM
8 years 6 months ago
Scalable Transportation Monitoring using the Smartphone Road Monitoring (SRoM) System
Our quest for ubiquitous Intelligent Transportation Systems (ITS) is simply infeasible over proprietary systems. In a time of abundant smart devices, it is impractical to consider...
Sam Aleyadeh, Sharief M. A. Oteafy, Hossam S. Hass...
MSWIM
2015
ACM
8 years 6 months ago
Modelling the Bandwidth Allocation Problem in Mobile Service-Oriented Networks
When the services requested by mobile application workflows are distributed over a network of mobile smart devices, the question arises as to which service should be allocated wi...
Bo Gao, Ligang He, Chao Chen
MSS
2015
IEEE
18views Hardware» more  MSS 2015»
8 years 6 months ago
Energy, complexity and sustainable long-term growth
We introduce the concept of product complexity in an endogenous growth model with renewable energy and expanding product variety `a la Grossman-Helpman (1991). We describe the com...
Jean-François Fagnart, Marc Germain
MSS
2015
IEEE
11views Hardware» more  MSS 2015»
8 years 6 months ago
Continuity, completeness, betweenness and cone-monotonicity
A non-trivial, transitive and reflexive binary relation on the set of lotteries satisfying independence that also satisfies any two of the following three axioms satisfies the ...
Edi Karni, Zvi Safra
MSS
2015
IEEE
20views Hardware» more  MSS 2015»
8 years 6 months ago
Individual and group stability in neutral restrictions of hedonic games
Abstract. We consider a class of coalition formation games called hedonic games, i.e., games in which the utility of a player is completely determined by the coalition that the pla...
Warut Suksompong
MSS
2015
IEEE
22views Hardware» more  MSS 2015»
8 years 6 months ago
Binary operations and lattice structure for a model of matching with contracts
: When a set is proved to have a lattice structure, the existence within the set of one least upper bound and one greatest lower bound for each pair of its elements, relative to ce...
Eliana Pepa Risma
MSS
2015
IEEE
18views Hardware» more  MSS 2015»
8 years 6 months ago
On aggregating human capital across heterogeneous cohorts
We consider a general framework for computing the aggregate human capital stock under heterogeneity across population cohorts, distinguishing between aggregate human capital stocks...
Jakub Growiec, Christian Groth
MSS
2015
IEEE
14views Hardware» more  MSS 2015»
8 years 6 months ago
Allocation rules for coalitional network games
Coalitional network games are real-valued functions defined on a set of players organized into a network and a coalition structure. We adopt a flexible approach assuming that pl...
Jean-François Caulier, Ana Mauleon, Vincent...