Sciweavers

11717 search results - page 2289 / 2344
» Where are you From
Sort
View
WINET
2002
169views more  WINET 2002»
13 years 9 months ago
Centaurus: An Infrastructure for Service Management in Ubiquitous Computing Environments
In the near future, we will see dramatic changes in computing and networking hardware. A large number of devices (e.g., phones, PDAs, even small household appliances) will become c...
Lalana Kagal, Vlad Korolev, Sasikanth Avancha, Anu...
CN
2008
97views more  CN 2008»
13 years 9 months ago
Cooperative content dissemination in multi-channel WLAN hotspots
It is common for hotspots in airports, cafes, and malls to deploy info-stations on their access points to provide local information such as flight schedule, multimedia access, sal...
Ching-Ju Lin, Cheng-Fu Chou
CORR
2010
Springer
184views Education» more  CORR 2010»
13 years 9 months ago
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the s...
Xiang He, Aylin Yener
CORR
2010
Springer
70views Education» more  CORR 2010»
13 years 9 months ago
Simultaneous communication in noisy channels
A sender wishes to broadcast a message of length n over an alphabet of size k to r users, where each user i, 1 i r should be able to receive one of possible mi messages. The cha...
Amit Weinstein
JASIS
2007
110views more  JASIS 2007»
13 years 9 months ago
Google Scholar citations and Google Web/URL citations: A multi-discipline exploratory analysis
In this paper we introduce a new data gathering method “Web/URL Citation” and use it and Google Scholar as a basis to compare traditional and Web-based citation patterns acros...
Kayvan Kousha, Mike Thelwall
« Prev « First page 2289 / 2344 Last » Next »