Sciweavers

26354 search results - page 188 / 5271
» How we refactor, and how we know it
Sort
View
CHI
2006
ACM
14 years 11 months ago
Being watched or being special: how I learned to stop worrying and love being monitored, surveilled, and assessed
This paper explores the relationship between display of feedback (public vs. private) by a computer system and the basis for evaluation (present vs. absent) of that feedback. We e...
Erica Robles, Abhay Sukumaran, Kathryn Rickertsen,...
SECON
2008
IEEE
14 years 5 months ago
Adaptive Radio Modes in Sensor Networks: How Deep to Sleep?
—Energy-efficient performance is a central challenge in sensor network deployments, and the radio is a major contributor to overall energy node consumption. Current energyeffic...
Raja Jurdak, Antonio G. Ruzzelli, Gregory M. P. O'...
AINA
2007
IEEE
14 years 5 months ago
How to Study Wireless Mesh Networks: A hybrid Testbed Approach
— Simulation is the most famous way to study wireless an mobile networks since they offer a convenient combination of flexibility and controllability. However, their largest dis...
Alexander Zimmermann, Mesut Günes, Martin Wen...
CTRSA
2007
Springer
146views Cryptology» more  CTRSA 2007»
14 years 5 months ago
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature
Standard signature schemes are usually designed only to achieve weak unforgeability – i.e. preventing forgery of signatures on new messages not previously signed. However, most s...
Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
NETCOOP
2007
Springer
14 years 4 months ago
How Expensive Is Link Utilization?
Understanding the relationship between queueing delays and link utilization for general traffic conditions is an important open problem in networking research. Difficulties in unde...
Rade Stanojevic, Robert Shorten