Sciweavers

CORR
2010
Springer
104views Education» more  CORR 2010»
13 years 11 months ago
An Optimal Lower Bound for Buffer Management in Multi-Queue Switches
In the online packet buffering problem (also known as the unweighted FIFO variant of buffer management), we focus on a single network packet switching device with several input po...
Marcin Bienkowski
CORR
2010
Springer
46views Education» more  CORR 2010»
13 years 11 months ago
Intrusions into Privacy in Video Chat Environments: Attacks and Countermeasures
Xinyu Xing, Jianxun Dang, Richard Han, Xue Liu, Sh...
CORR
2010
Springer
142views Education» more  CORR 2010»
13 years 11 months ago
Integrality Gaps of Linear and Semi-definite Programming Relaxations for Knapsack
Recent years have seen an explosion of interest in lift and project methods, such as those proposed by Lov
Anna R. Karlin, Claire Mathieu, C. Thach Nguyen
CORR
2010
Springer
167views Education» more  CORR 2010»
13 years 11 months ago
Development of a Context Aware Virtual Smart Home Simulator
Context awareness is the most important research area in ubiquitous computing. In particular, for smart home, context awareness attempts to bring the best services to the home hab...
Tam Van Nguyen, Huy Anh Nguyen, Deokjai Choi
CORR
2010
Springer
157views Education» more  CORR 2010»
13 years 11 months ago
Context Ontology Implementation for Smart Home
Context awareness is one of the important fields in ubiquitous computing. Smart Home, a specific instance of ubiquitous computing, provides every family with opportunities to enjo...
Tam Van Nguyen, Wontaek Lim, Huy Anh Nguyen, Deokj...
CORR
2010
Springer
157views Education» more  CORR 2010»
13 years 11 months ago
Context Awareness Framework Based on Contextual Graph
- Nowadays computing becomes increasingly mobile and pervasive. One of the important steps in pervasive computing is context-awareness. Context-aware pervasive systems rely on info...
Tam Van Nguyen, Wontaek Lim, Huy Anh Nguyen, Deokj...
CORR
2010
Springer
176views Education» more  CORR 2010»
13 years 11 months ago
Network Traffic Anomalies Detection and Identification with Flow Monitoring
Network management and security is currently one of the most vibrant research areas, among which, research on detecting and identifying anomalies has attracted a lot of interest. R...
Huy Anh Nguyen, Tam Van Nguyen, Dong Il Kim, Deokj...
CORR
2010
Springer
157views Education» more  CORR 2010»
13 years 11 months ago
A Dense Hierarchy of Sublinear Time Approximation Schemes for Bin Packing
The bin packing problem is to find the minimum number of bins of size one to pack a list of items with sizes a1,
Richard Beigel, Bin Fu
CORR
2010
Springer
98views Education» more  CORR 2010»
13 years 11 months ago
Efficient Sketches for the Set Query Problem
We develop an algorithm for estimating the values of a vector x Rn over a support S of size k from a randomized sparse binary linear sketch Ax of size O(k). Given Ax and S, we ca...
Eric Price
CORR
2010
Springer
207views Education» more  CORR 2010»
13 years 11 months ago
A Jamming-Resistant MAC Protocol for Multi-Hop Wireless Networks
This paper presents a simple local medium access control protocol, called Jade, for multi-hop wireless networks with a single channel that is provably robust against adaptive adver...
Andréa W. Richa, Christian Scheideler, Stef...