Sciweavers

2821 search results - page 141 / 565
» Tracing a single user
Sort
View
141
Voted
IADIS
2004
15 years 5 months ago
Detecting Unauthorized Use in Online Journal Archives: A Case Study
JSTOR is a not-for-profit online library containing a full back-run of digitized versions of a large number of academic journals. In order to help defray costs for maintaining the...
Paul Seligman, Sean W. Smith
163
Voted
GLOBECOM
2010
IEEE
15 years 2 months ago
Optimal Pricing for Mobile Video Streaming Using Behavior Analysis
Mobile phones are among the most popular consumer devices and the recent developments of 3G networks and smart phones enable users to watch video programs by subscribing data plan...
W. Sabrina Lin, K. J. Ray Liu
IMC
2010
ACM
15 years 1 months ago
On the feasibility of effective opportunistic spectrum access
Dynamic spectrum access networks are designed to allow today's bandwidth hungry "secondary devices" to share spectrum allocated to legacy devices, or "primary ...
Vinod Kone, Lei Yang, Xue Yang, Ben Y. Zhao, Haita...
TDSC
2011
14 years 11 months ago
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fan...
ICASSP
2011
IEEE
14 years 7 months ago
Pricing game and evolution dynamics for mobile video streaming
The recent developments of smart mobile phones and 3G networks enable users to enjoy video programs by subscribing to data plans. Due to phone-to-phone communication technologies ...
Wan-Yi Sabrina Lin, K. J. Ray Liu