Sciweavers

42 search results - page 7 / 9
» Challenges and opportunities in electronic textiles modeling...
Sort
View
SIGECOM
2009
ACM
117views ECommerce» more  SIGECOM 2009»
14 years 2 months ago
Sybilproof transitive trust protocols
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
Paul Resnick, Rahul Sami
ICC
2007
IEEE
288views Communications» more  ICC 2007»
14 years 1 months ago
Joint Channel State Based Random Access and Adaptive Modulation in Wireless LAN with Multi-Packet Reception
—Conventional 802.11 medium access control (MAC) characteristics. In particular, all of these designs adopted a protocols have been designed separately from the characteristics s...
Wei Lan Huang, Khaled Ben Letaief, Ying Jun Zhang
INFOCOM
2011
IEEE
12 years 11 months ago
Opportunistic spectrum access for mobile cognitive radios
—Cognitive radios (CRs) can mitigate the impending spectrum scarcity problem by utilizing their capability of accessing licensed spectrum bands opportunistically. While most exis...
Alexander W. Min, Kyu-Han Kim, Jatinder Pal Singh,...
SIGMOD
2008
ACM
161views Database» more  SIGMOD 2008»
14 years 7 months ago
Efficient pattern matching over event streams
Pattern matching over event streams is increasingly being employed in many areas including financial services, RFIDbased inventory management, click stream analysis, and electroni...
Jagrati Agrawal, Yanlei Diao, Daniel Gyllstrom, Ne...
WWW
2008
ACM
14 years 8 months ago
Utility-driven load shedding for xml stream processing
Because of the high volume and unpredictable arrival rate, stream processing systems may not always be able to keep up with the input data streams-- resulting in buffer overflow a...
Mingzhu Wei, Elke A. Rundensteiner, Murali Mani