Sciweavers

3379 search results - page 342 / 676
» Powers of Two
Sort
View
STORAGESS
2006
ACM
15 years 10 months ago
Secure deletion myths, issues, and solutions
This paper has three goals. (1) We try to debunk several held misconceptions about secure deletion: that encryption is an ideal solution for everybody, that existing data-overwrit...
Nikolai Joukov, Harry Papaxenopoulos, Erez Zadok
MOBICOM
2009
ACM
15 years 11 months ago
Optimal beam scheduling for multicasting in wireless networks
We consider the problem of efficient link-layer multicasting in wireless networks with switched beamforming antennas. The inherent tradeoff between multicasting and beamforming ...
Karthikeyan Sundaresan, Kishore Ramachandran, Samp...
ADHOC
2007
100views more  ADHOC 2007»
15 years 4 months ago
A GPS-less, outdoor, self-positioning method for wireless sensor networks
One challenging issue in sensor networks is to determine where a given sensor node is physically located. This problem is especially crucial for very small sensor nodes. This pape...
Hung-Chi Chu, Rong-Hong Jan
IJDMMM
2010
128views more  IJDMMM 2010»
15 years 3 months ago
Graphical models based hierarchical probabilistic community discovery in large-scale social networks
: Real-world social networks, while disparate in nature, often comprise of a set of loose clusters (a.k.a. communities), in which members are better connected to each other than to...
Haizheng Zhang, Ke Ke, Wei Li, Xuerui Wang
ICASSP
2009
IEEE
15 years 8 months ago
What happens when cognitive terminals compete for a relaying node?
We introduce a new channel, which consists of an interference channel (IC) in parallel with an interference relay channel (IRC), to analyze the interaction between two selfish and...
Elena Veronica Belmega, Brice Djeumou, Samson Lasa...