Sciweavers

1852 search results - page 295 / 371
» From Bi-ideals to Periodicity
Sort
View
ICDCS
2011
IEEE
12 years 8 months ago
Competitive and Fair Medium Access Despite Reactive Jamming
Abstract—Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often...
Andréa W. Richa, Christian Scheideler, Stef...
MOBISYS
2009
ACM
14 years 9 months ago
Blue-Fi: enhancing Wi-Fi performance using bluetooth signals
Mobile devices are increasingly equipped with multiple network interfaces with complementary characteristics. In particular, the Wi-Fi interface has high throughput and transfer p...
Ganesh Ananthanarayanan, Ion Stoica
CORR
2012
Springer
227views Education» more  CORR 2012»
12 years 4 months ago
Trajectory and Policy Aware Sender Anonymity in Location Based Services
We consider Location-based Service (LBS) settings, where a LBS provider logs the requests sent by mobile device users over a period of time and later wants to publish/share these ...
Alin Deutsch, Richard Hull, Avinash Vyas, Kevin Ke...
CORR
2012
Springer
179views Education» more  CORR 2012»
12 years 4 months ago
Distributional convergence for the number of symbol comparisons used by QuickSort
d Abstract) James Allen Fill1† 1 Department of Applied Mathematics and Statistics, The Johns Hopkins University, 34th and Charles Streets, Baltimore, MD 21218-2682 USA received 2...
James Allen Fill
CSCW
2012
ACM
12 years 4 months ago
Blogs as a collective war diary
Disaster-related research in human-centered computing has typically focused on the shorter-term, emergency period of a disaster event, whereas effects of some crises are longterm,...
Gloria Mark, Mossaab Bagdouri, Leysia Palen, James...