Sciweavers

5687 search results - page 1004 / 1138
» Visualizing Evaluation in Scheme
Sort
View
PVLDB
2010
143views more  PVLDB 2010»
13 years 7 months ago
Embellishing Text Search Queries To Protect User Privacy
Users of text search engines are increasingly wary that their activities may disclose confidential information about their business or personal profiles. It would be desirable f...
HweeHwa Pang, Xuhua Ding, Xiaokui Xiao
TCOM
2010
145views more  TCOM 2010»
13 years 7 months ago
Blind Cooperative Diversity Using Distributed Space-Time Coding in Block Fading Channels
— Mobile users with single antennas can still take advantage of spatial diversity through cooperative space-time encoded transmission. In this paper, we consider a scheme in whic...
Kamel Tourki, Mohamed-Slim Alouini, Luc Deneire
TELSYS
2010
122views more  TELSYS 2010»
13 years 7 months ago
Transmission scheduling for multi-homed transport protocols with network failure tolerance
In heterogeneous network environments, the network connections of a multi-homed device may have significant bandwidth differential. For a multihomed transmission protocol designed ...
Yuansong Qiao, Enda Fallon, John Murphy, Liam Murp...
TMC
2010
137views more  TMC 2010»
13 years 7 months ago
A Metric for DISH Networks: Analysis, Implications, and Applications
—In wireless networks, node cooperation has been exploited as a data relaying mechanism for decades. However, the wireless channel allows for much richer interaction among nodes....
Tie Luo, Vikram Srinivasan, Mehul Motani
UIC
2010
Springer
13 years 7 months ago
A Lattice-Theoretic Approach to Runtime Property Detection for Pervasive Context
Abstract. Runtime detection of contextual properties is one of the primary approaches to enabling context-awareness. Existing property detection schemes implicitly assume that cont...
Tingting Hua, Yu Huang 0002, Jiannong Cao, XianPin...
« Prev « First page 1004 / 1138 Last » Next »