Sciweavers

245 search results - page 31 / 49
» pervasive 2008
Sort
View
118
Voted
USS
2008
15 years 6 months ago
Challenges and Directions for Monitoring P2P File Sharing Networks - or - Why My Printer Received a DMCA Takedown Notice
We reverse engineer copyright enforcement in the popular BitTorrent file sharing network and find that a common approach for identifying infringing users is not conclusive. We desc...
Michael Piatek, Tadayoshi Kohno, Arvind Krishnamur...
118
Voted
CBMS
2008
IEEE
15 years 10 months ago
A Self-Test to Detect a Heart Attack Using a Mobile Phone and Wearable Sensors
This paper describes a heart attack self-test application for a mobile phone which allows potential victims of a heart attack to quickly assess whether they are having a heart att...
Peter Leijdekkers, Valérie Gay
106
Voted
CSSE
2008
IEEE
15 years 10 months ago
Constructing a Fractal P2P Network
—A Peer-to-Peer (P2P) network is a communication network constructed on application level, for the purpose of exchanging information among peers. Fractal, defined as an object or...
Changxiong Tang, Rui Wang
117
Voted
IAT
2008
IEEE
15 years 10 months ago
Auction Analysis by Normal Form Game Approximation
Auctions are pervasive in today’s society and provide a variety of real markets. This article facilitates a strategic choice between a set of available trading strategies by int...
Michael Kaisers, Karl Tuyls, Frank Thuijsman, Simo...
138
Voted
IAT
2008
IEEE
15 years 10 months ago
A Pragmatic Approach to Realizing Context-Aware Personal Services
As network and computing technologies have improved, and the number of mobile devices has increased, realizing context-aware personal services has become one of the most important...
Sangkeun Lee, Dongjoo Lee, Seungseok Kang, Sang-go...