Sciweavers

7486 search results - page 1452 / 1498
» The Limits of Quantum Computers
Sort
View
SIGCOMM
2010
ACM
13 years 10 months ago
Data center TCP (DCTCP)
Cloud data centers host diverse applications, mixing workloads that require small predictable latency with others requiring large sustained throughput. In this environment, today&...
Mohammad Alizadeh, Albert G. Greenberg, David A. M...
SIGCOMM
2010
ACM
13 years 10 months ago
An analysis of social network-based Sybil defenses
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...
SIGCOMM
2010
ACM
13 years 10 months ago
On the forwarding capability of mobile handhelds for video streaming over MANETs
Despite the importance of real-world experiments, nearly all ongoing research activities addressing video streaming over MANETs are based on simulation studies. Earlier research s...
Stein Kristiansen, Morten Lindeberg, Daniel Rodr&i...
SIGCOMM
2010
ACM
13 years 10 months ago
Trust no one: a decentralized matching service for privacy in location based services
We propose a new approach to ensure privacy in location based services, without requiring any support from a"trusted" entity. We observe that users of location based ser...
Sharad Jaiswal, Animesh Nandi
ADHOC
2007
102views more  ADHOC 2007»
13 years 10 months ago
On the capacity of the single source multiple relay single destination mesh network
In this paper, we derive the information theoretic capacity of a special class of mesh networks. A mesh network is a heterogeneous wireless network in which the transmission among...
Lawrence Ong, Mehul Motani
« Prev « First page 1452 / 1498 Last » Next »