Sciweavers

2347 search results - page 433 / 470
» Location, location, location: a study of bluejacking practic...
Sort
View
SIGMOD
2010
ACM
236views Database» more  SIGMOD 2010»
14 years 15 days ago
Differentially private aggregation of distributed time-series with transformation and encryption
We propose PASTE, the first differentially private aggregation algorithms for distributed time-series data that offer good practical utility without any trusted server. PASTE add...
Vibhor Rastogi, Suman Nath
INFOCOM
2006
IEEE
14 years 1 months ago
Predictability of WLAN Mobility and Its Effects on Bandwidth Provisioning
— Wireless local area networks (WLANs) are emerging as a popular technology for access to the Internet and enterprise networks. In the long term, the success of WLANs depends on ...
Libo Song, Udayan Deshpande, Ulas C. Kozat, David ...
SCAM
2006
IEEE
14 years 1 months ago
Stop-List Slicing
Traditional program slicing requires two parameters: a program location and a variable, or perhaps a set of variables, of interest. Stop-list slicing adds a third parameter to the...
Keith Gallagher, David Binkley, Mark Harman
ICSM
2008
IEEE
14 years 2 months ago
Retrieving relevant reports from a customer engagement repository
Customers of modern enterprise applications commonly engage the vendor of the application for onsite troubleshooting and fine tuning of large deployments. The results of these eng...
Dharmesh Thakkar, Zhen Ming Jiang, Ahmed E. Hassan...
IMC
2005
ACM
14 years 1 months ago
Measurements, Analysis, and Modeling of BitTorrent-like Systems
Existing studies on BitTorrent systems are single-torrent based, while more than 85% of all peers participate in multiple torrents according to our trace analysis. In addition, th...
Lei Guo, Songqing Chen, Zhen Xiao, Enhua Tan, Xiao...