Sciweavers

300 search results - page 29 / 60
» Designing a Practical Access Point Association Protocol
Sort
View
NDSS
2008
IEEE
14 years 2 months ago
Usable PIR
In [22] we showed that existing single-server computational private information retrieval (PIR) protocols for the purpose of preserving client access patterns leakage are orders o...
Peter Williams, Radu Sion
PEWASUN
2006
ACM
14 years 1 months ago
Performance evaluation of backoff algorithms in 802.11 ad-hoc networks
Understanding the performance of backoff algorithms in multihop ad hoc networks is a key feature to design efficient Medium Access Protocols for wireless networks. The 802.11 bac...
Tahiry Razafindralambo, Fabrice Valois
FMLDO
1999
Springer
137views Database» more  FMLDO 1999»
14 years 3 days ago
Federated Transaction Management with Snapshot Isolation
Federated transaction management (also known as multidatabase transaction management in the literature) is needed to ensure the consistency of data that is distributed across mult...
Ralf Schenkel, Gerhard Weikum, Norbert Weiße...
ACMDIS
2008
ACM
13 years 9 months ago
Sharing digital photographs in the home through physical mementos, souvenirs, and keepsakes
People now easily share digital photos outside the home via web publishing and gift-giving. Yet within the home, digital photos are hard to access and lack the physical affordance...
Michael Nunes, Saul Greenberg, Carman Neustaedter
IMC
2007
ACM
13 years 9 months ago
Understanding handoffs in large ieee 802.11 wireless networks
As the utility of wireless technology grows, wireless networks are being deployed in more widely varying conditions. The monitoring of these networks continues to reveal key imple...
Ramya Raghavendra, Elizabeth M. Belding, Konstanti...