Sciweavers

11594 search results - page 2043 / 2319
» Cooperation in Service Systems
Sort
View
TDSC
2011
14 years 11 months ago
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fan...
CDC
2010
IEEE
123views Control Systems» more  CDC 2010»
14 years 11 months ago
Implicit learning for explicit discount targeting in Online Social networks
Online Social networks are increasingly being seen as a means of obtaining awareness of user preferences. Such awareness could be used to target goods and services at them. We cons...
Srinivas Shakkottai, Lei Ying, Sankalp Sah
JCIT
2010
197views more  JCIT 2010»
14 years 11 months ago
Comparative Study of M/Er/1 and M/M/1 Queuing Delay Models of the two IP-PBXs
Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies to delivery of voice communications over IP networks such as the Internet or other ...
Alireza Dehestani, Pedram Hajipour
TELSYS
2010
147views more  TELSYS 2010»
14 years 11 months ago
A new worm propagation threat in BitTorrent: modeling and analysis
Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting thes...
Sinan Hatahet, Abdelmadjid Bouabdallah, Yacine Cha...
CIDR
2011
228views Algorithms» more  CIDR 2011»
14 years 8 months ago
Crowdsourced Databases: Query Processing with People
Amazon’s Mechanical Turk (“MTurk”) service allows users to post short tasks (“HITs”) that other users can receive a small amount of money for completing. Common tasks on...
Adam Marcus 0002, Eugene Wu 0002, Samuel Madden, R...
« Prev « First page 2043 / 2319 Last » Next »