Sciweavers

216 search results - page 41 / 44
» Supporting Secure Communication and Data Collection in Mobil...
Sort
View
EUROSYS
2010
ACM
14 years 23 days ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry
NETWORK
2008
150views more  NETWORK 2008»
13 years 7 months ago
WiMAX networks: from access to service platform
Recently, WiMAX has been proposed as an attractive wireless communication technology for providing broadband access for metropolitan areas. Despite its salient features from the t...
Kejie Lu, Yi Qian, Hsiao-Hwa Chen, Shengli Fu
SIGCOMM
2012
ACM
11 years 10 months ago
Measuring and fingerprinting click-spam in ad networks
Advertising plays a vital role in supporting free websites and smartphone apps. Click-spam, i.e., fraudulent or invalid clicks on online ads where the user has no actual interest ...
Vacha Dave, Saikat Guha, Yin Zhang
COMCOM
2007
115views more  COMCOM 2007»
13 years 7 months ago
New bluetooth interconnection methods: Overlaid Bluetooth Piconets (OBP) and Temporary Scatternets (TS)
In a large scale Bluetooth network, the permanent Scatternet is regarded as the only method to interconnect Piconets. But, many Bluetooth devices do not support Scatternet. When t...
Sewook Jung, Alexander Chang, Mario Gerla
RTSS
2008
IEEE
14 years 2 months ago
Rate-Harmonized Scheduling for Saving Energy
—Energy consumption continues to be a major concern in multiple application domains including powerhungry data centers, portable and wearable devices, mobile communication device...
Anthony Rowe, Karthik Lakshmanan, Haifeng Zhu, Rag...