Sciweavers

111 search results - page 16 / 23
» Comparing values and sentiment using Mechanical Turk
Sort
View
ICSE
2011
IEEE-ACM
12 years 11 months ago
Inference of field initialization
A raw object is partially initialized, with only some fields set to legal values. It may violate its object invariants, such as that a given field is non-null. Programs often ma...
Fausto Spoto, Michael D. Ernst
ADHOCNOW
2005
Springer
14 years 1 months ago
Enhancing the Security of On-demand Routing in Ad Hoc Networks
We present the Ad-hoc On-demand Secure Routing (AOSR) protocol, which uses pairwise shared keys between pairs of mobile nodes and hash values keyed with them to verify the validity...
Zhenjiang Li, J. J. Garcia-Luna-Aceves
JSAC
2008
108views more  JSAC 2008»
13 years 7 months ago
Collision-aware design of rate adaptation for multi-rate 802.11 WLANs
One of the key challenges in designing a rate adaptation scheme for IEEE 802.11 wireless LANs (WLANs) is to differentiate bit errors from link-layer collisions. Many recent rate a...
Jaehyuk Choi, Jongkeun Na, Yeon-sup Lim, Kihong Pa...
SIGECOM
2008
ACM
127views ECommerce» more  SIGECOM 2008»
13 years 7 months ago
Posted prices vs. negotiations: an asymptotic analysis
Full revelation of private values is impractical in many large-scale markets, where posted price mechanisms are a simpler alternative. In this work, we compare the asymptotic beha...
Liad Blumrosen, Thomas Holenstein
MSWIM
2005
ACM
14 years 1 months ago
Adaptive transmission opportunity with admission control for IEEE 802.11e networks
The increase of IEEE 802.11’s bandwidth led to a deployment of many multimedia applications over wireless networks. Nevertheless, these applications impose stringent constraints...
Adlen Ksentini, Abdelhak Guéroui, Mohamed N...