Sciweavers

1962 search results - page 342 / 393
» Evaluating System Performance in Gigabit Networks
Sort
View
MOBIDE
2010
ACM
13 years 7 months ago
Power-aware operator placement and broadcasting of continuous query results
Complex event detection over data streams has become ubiquitous through the widespread use of sensors, wireless connectivity and the wide variety of end-user mobile devices. Typic...
Panayiotis Neophytou, Mohamed A. Sharaf, Panos K. ...
TON
2010
80views more  TON 2010»
13 years 5 months ago
Replication routing in DTNs: a resource allocation approach
—Routing protocols for disruption-tolerant networks (DTNs) use a variety of mechanisms, including discovering the meeting probabilities among nodes, packet replication, and netwo...
Aruna Balasubramanian, Brian Neil Levine, Arun Ven...
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
12 years 11 months ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
PERCOM
2007
ACM
14 years 7 months ago
BlueTorrent: Cooperative content sharing for Bluetooth users
People wish to enjoy their everyday lives in various ways, among which entertainment plays a major role. In order to improve lifestyle with more ready access to entertainment cont...
Sewook Jung, Uichin Lee, Alexander Chang, Dae-Ki C...
PERCOM
2009
ACM
14 years 2 months ago
Towards Privacy-Sensitive Participatory Sensing
—The ubiquity of mobile devices has brought forth the concept of participatory sensing, whereby ordinary citizens can now contribute and share information from the urban environm...
Kuan Lun Huang, Salil S. Kanhere, Wen Hu