Sciweavers

18493 search results - page 3431 / 3699
» Timers for Distributed Systems
Sort
View
168
Voted
MOBIHOC
2010
ACM
15 years 13 days ago
Detecting intra-room mobility with signal strength descriptors
We explore the problem of detecting whether a device has moved within a room. Our approach relies on comparing summaries of received signal strength measurements over time, which ...
Konstantinos Kleisouris, Bernhard Firner, Richard ...
P2P
2010
IEEE
127views Communications» more  P2P 2010»
15 years 12 days ago
Waiting for Anonymity: Understanding Delays in the Tor Overlay
Although Tor is the most widely used overlay for providing anonymity services, its users often experience very high delays. Because much of Tor usage is for Web applications, which...
Prithula Dhungel, Moritz Steiner, Ivinko Rimac, Vo...
PIMRC
2010
IEEE
15 years 12 days ago
Connectivity in wireless networks with dynamic key compromise and recovery
Abstract--This paper considers the problem of key management in wireless networks. In particular, we investigate the effect of dynamic key compromise and recovery on connectivity i...
Satashu Goel, Aylin Yener
139
Voted
SECON
2010
IEEE
15 years 12 days ago
A Robust Push-To-Talk Service for Wireless Mesh Networks
Push-to-Talk (PTT) is a useful capability for rapidly deployable wireless mesh networks used by first responders. PTT allows several users to speak with each other while using a si...
Yair Amir, Raluca Musaloiu-Elefteri, Nilo Rivera
151
Voted
SEMWEB
2010
Springer
15 years 12 days ago
Optimize First, Buy Later: Analyzing Metrics to Ramp-Up Very Large Knowledge Bases
As knowledge bases move into the landscape of larger ontologies and have terabytes of related data, we must work on optimizing the performance of our tools. We are easily tempted t...
Paea LePendu, Natalya Fridman Noy, Clement Jonquet...
« Prev « First page 3431 / 3699 Last » Next »