Sciweavers

18321 search results - page 3643 / 3665
» The benefits of using information systems
Sort
View
MOBIHOC
2008
ACM
14 years 8 months ago
An O(log n) dominating set protocol for wireless ad-hoc networks under the physical interference model
Dealing with interference is one of the primary challenges to solve in the design of protocols for wireless ad-hoc networks. Most of the work in the literature assumes localized o...
Christian Scheideler, Andréa W. Richa, Paol...
MOBIHOC
2007
ACM
14 years 8 months ago
Scalable routing in delay tolerant networks
The non-existence of an end-to-end path poses a challenge in adapting the traditional routing algorithms to delay tolerant networks (DTNs). Previous works include centralized rout...
Cong Liu, Jie Wu
WWW
2010
ACM
14 years 3 months ago
Live web search experiments for the rest of us
There are significant barriers to academic research into user Web search preferences. Academic researchers are unable to manipulate the results shown by a major search engine to ...
Timothy Jones, David Hawking, Ramesh S. Sankaranar...
ACSAC
2009
IEEE
14 years 3 months ago
FIRE: FInding Rogue nEtworks
For many years, online criminals have been able to conduct their illicit activities by masquerading behind disreputable Internet Service Providers (ISPs). For example, organizatio...
Brett Stone-Gross, Christopher Kruegel, Kevin C. A...
TEI
2009
ACM
95views Hardware» more  TEI 2009»
14 years 3 months ago
Living interfaces: the intimate door lock
In this paper we introduce a new way to interact intimately with an automated system. The Intimate Door Lock investigates the psychological effects of intimate humanhuman interact...
Miriam Roy, Fabian Hemmert, Reto Wettach
« Prev « First page 3643 / 3665 Last » Next »