Sciweavers

13383 search results - page 2313 / 2677
» Abstractions from proofs
Sort
View
PERCOM
2011
ACM
14 years 8 months ago
Market mechanisms for Value of Information driven resource allocation in Sensor Networks
—This paper examines the possible uses of different market mechanisms for resource allocation at different levels of Wireless Sensor Network (WSN) architecture. The goal is to ma...
Boleslaw K. Szymanski, S. Yousaf Shah, Sahin Cem G...
PERCOM
2011
ACM
14 years 8 months ago
Towards preserving privacy in participatory sensing
Abstract—With the abundance and ubiquity of mobile devices, a new class of applications is emerging, called participatory sensing (PS), where people can contribute data (e.g., im...
Leyla Kazemi, Cyrus Shahabi
WIOPT
2011
IEEE
14 years 8 months ago
Open loop optimal control of base station activation for green networks
Abstract—In recent years there has been an increasing awareness that the deployment as well as utilization of new information technology may have some negative ecological impact....
Sreenath Ramanath, Veeraruna Kavitha, Eitan Altman
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
14 years 8 months ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
AIED
2011
Springer
14 years 8 months ago
Peering Inside Peer Review with Bayesian Models
Abstract. Instructors and students would benefit more from computersupported peer review, if instructors received information on how well students have understood the conceptual is...
Ilya M. Goldin, Kevin D. Ashley
« Prev « First page 2313 / 2677 Last » Next »