Sciweavers

3641 search results - page 672 / 729
» A System Design Methodology for Telecommunication Network Ap...
Sort
View
CMS
2006
127views Communications» more  CMS 2006»
13 years 9 months ago
Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication
Abstract. There are a number of attacker models in the area of anonymous communication. Most of them are either very simplified or pretty abstract - therefore difficult to generali...
Andriy Panchenko, Lexi Pimenidis
SCANGIS
2003
13 years 9 months ago
Mobile E-Commerce and Location-Based Services: Technology and Requirements
Advances in Internet and network technology and the rapidly growing number of mobile personal devices result in the fast growth of Mobile E-Commerce, M-Commerce. In this paper we v...
Aphrodite Tsalgatidou, Jari Veijalainen, Jouni Mar...
IMC
2010
ACM
13 years 5 months ago
On the feasibility of effective opportunistic spectrum access
Dynamic spectrum access networks are designed to allow today's bandwidth hungry "secondary devices" to share spectrum allocated to legacy devices, or "primary ...
Vinod Kone, Lei Yang, Xue Yang, Ben Y. Zhao, Haita...
SENSYS
2010
ACM
13 years 5 months ago
Estimating building consumption breakdowns using ON/OFF state sensing and incremental sub-meter deployment
This paper considers the problem of estimating the power breakdowns for the main appliances inside a building using a small number of power meters and the knowledge of the ON/OFF ...
Deokwoo Jung, Andreas Savvides
SAC
2011
ACM
12 years 10 months ago
Tracking continuous topological changes of complex moving regions
A moving region whose location and extend change over time can imply topological changes such as region split and hole formation. To study this phenomenon is useful in many applic...
Hechen Liu, Markus Schneider