Sciweavers

13500 search results - page 2684 / 2700
» Improved analysis of D
Sort
View
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
13 years 8 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
GLOBECOM
2010
IEEE
13 years 8 months ago
ViVUD: Virtual Server Cluster Based View-Upload Decoupling for Multi-Channel P2P Video Streaming Systems
Despite the success to deliver increasingly large number of channels to millions of users, the current multichannel P2P video streaming systems still suffer several fundamental per...
Chao Liang, Yong Liu
GLOBECOM
2010
IEEE
13 years 8 months ago
Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks
Duty cycling is often used to reduce the energy consumption caused by idle listening in Wireless Sensor Networks (WSNs). Most studies on WSN protocols define a common duty cycle va...
Yuqun Zhang, Chen-Hsiang Feng, Ilker Demirkol, Wen...
IFIPTCS
2010
13 years 8 months ago
Approximating the Non-contiguous Multiple Organization Packing Problem
We present in this paper a 5/2-approximation algorithm for scheduling rigid jobs on multi-organizations. For a given set of n jobs, the goal is to construct a schedule for N organi...
Marin Bougeret, Pierre-François Dutot, Klau...
IMC
2010
ACM
13 years 8 months ago
Characterizing radio resource allocation for 3G networks
3G cellular data networks have recently witnessed explosive growth. In this work, we focus on UMTS, one of the most popular 3G mobile communication technologies. Our work is the f...
Feng Qian, Zhaoguang Wang, Alexandre Gerber, Zhuoq...
« Prev « First page 2684 / 2700 Last » Next »