Sciweavers

7839 search results - page 1524 / 1568
» What's there and what's not
Sort
View
IEEECIT
2010
IEEE
13 years 9 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
IGPL
2010
161views more  IGPL 2010»
13 years 9 months ago
Extending the Hegselmann-Krause Model I
Hegselmann and Krause have developed a simple yet powerful computational model for studying the opinion dynamics in societies of epistemically interacting truth-seeking agents. We...
Igor Douven, Alexander Riegler
INFOCOM
2010
IEEE
13 years 9 months ago
The Capacity of Heterogeneous Wireless Networks
—Although capacity has been extensively studied in wireless networks, most of the results are for homogeneous wireless networks where all nodes are assumed identical. In this pap...
Pan Li, Yuguang Fang
INFOCOM
2010
IEEE
13 years 9 months ago
A Framework for Joint Network Coding and Transmission Rate Control in Wireless Networks
—Network coding has been proposed as a technique that can potentially increase the transport capacity of a wireless network via processing and mixing of data packets at intermedi...
Tae-Suk Kim, Serdar Vural, Ioannis Broustis, Dimit...
INFOCOM
2010
IEEE
13 years 9 months ago
Improving QoS in BitTorrent-like VoD Systems
—In recent years a number of research efforts have focused on effective use of P2P-based systems in providing large scale video streaming services. In particular, live streaming ...
Yan Yang, Alix L. H. Chow, Leana Golubchik, Daniel...
« Prev « First page 1524 / 1568 Last » Next »