Sciweavers

37 search results - page 5 / 8
» Name Strategy: Its Existence and Implications
Sort
View
MOBIHOC
2007
ACM
14 years 6 months ago
Distributed opportunistic scheduling for ad-hoc communications: an optimal stopping approach
We consider distributed opportunistic scheduling (DOS) in wireless ad-hoc networks, where many links contend for the same channel using random access. In such networks, distribute...
Dong Zheng, Weiyan Ge, Junshan Zhang
INFOCOM
2009
IEEE
14 years 1 months ago
Protecting Against Network Infections: A Game Theoretic Perspective
— Security breaches and attacks are critical problems in today’s networking. A key-point is that the security of each host depends not only on the protection strategies it choo...
Jasmina Omic, Ariel Orda, Piet Van Mieghem
GLOBECOM
2008
IEEE
14 years 1 months ago
MACA-U: A Media Access Protocol for Underwater Acoustic Networks
—Unlike terrestrial wireless communication which uses radio waves, underwater communication relies on acoustic waves. The long latency and limited bandwidth pose great challenges...
Hai-Heng Ng, Wee-Seng Soh, Mehul Motani
CORR
2012
Springer
170views Education» more  CORR 2012»
12 years 2 months ago
What Cannot be Learned with Bethe Approximations
We address the problem of learning the parameters in graphical models when inference is intractable. A common strategy in this case is to replace the partition function with its B...
Uri Heinemann, Amir Globerson
HICSS
2008
IEEE
317views Biometrics» more  HICSS 2008»
14 years 1 months ago
Trust in Online Shopping: The Korean Student Experience
E-commerce has become an important part of business. In South Korea, the market size of online shopping malls was 13,460 billion Korean Won in 2006, and this figure keeps growing....
Ji-Seok Yoo, Jae-Nam Lee, Julian Hoffmann