Sciweavers

98 search results - page 11 / 20
» Fundamental Limits on the Anonymity Provided by the MIX Tech...
Sort
View
ICDCS
2009
IEEE
14 years 4 months ago
Protecting Neighbor Discovery Against Node Compromises in Sensor Networks
The neighborhood information has been frequently used by protocols such as routing in sensor networks. Many methods have been proposed to protect such information in hostile envir...
Donggang Liu
ICECCS
2010
IEEE
162views Hardware» more  ICECCS 2010»
13 years 7 months ago
Trust-Based Adaptation in Complex Service-Oriented Systems
Abstract—Complex networks consisting of humans and software services, such as Web-based social and collaborative environments, typically require flexible and context-based inter...
Florian Skopik, Daniel Schall, Schahram Dustdar
ICDE
2010
IEEE
170views Database» more  ICDE 2010»
14 years 7 months ago
Workload Driven Index Defragmentation
Decision support queries that scan large indexes can suffer significant degradation in I/O performance due to index fragmentation. DBAs rely on rules of thumb that use index size a...
Manoj Syamala, Vivek R. Narasayya
CGVR
2007
13 years 8 months ago
Evaluation of Stereoscopy and Lit Shading for a Counting Task in Knot Visualization
We present an experiment on depth cues for knot visualization in desktop virtual reality (fishtank VR). We used a within-subjects experiment to investigate stereoscopic visuals an...
Nicholas G. Lipari, Christoph W. Borst
ICASSP
2011
IEEE
12 years 11 months ago
Interference alignment in clustered ad hoc networks: High reliability regime and per-cluster aloha
Wireless networks are fundamentally limited by the intensity of the received signals and the mutual interference caused by many concurrent transmissions. We consider large wireles...
Roland Tresch, Giusi Alfano, Maxime Guillaud