Sciweavers

529 search results - page 105 / 106
» A wavelet-based sampling algorithm for wireless sensor netwo...
Sort
View
WWW
2007
ACM
14 years 6 months ago
Life is sharable: mechanisms to support and sustain blogging life experience
Recent trend in the development of mobile devices, wireless communications, sensor technologies, weblogs, and peer-to-peer communications have prompted a new design opportunity fo...
Yun-Maw Cheng, Tzu-Chuan Chou, Wai Yu, Li-Chieh Ch...
TELETRAFFIC
2007
Springer
13 years 11 months ago
Is ALOHA Causing Power Law Delays?
Abstract. Renewed interest in ALOHA-based Medium Access Control (MAC) protocols stems from their proposed applications to wireless ad hoc and sensor networks that require distribut...
Predrag R. Jelenkovic, Jian Tan
MOBISYS
2010
ACM
13 years 7 months ago
CrowdSearch: exploiting crowds for accurate real-time image search on mobile phones
Mobile phones are becoming increasingly sophisticated with a rich set of on-board sensors and ubiquitous wireless connectivity. However, the ability to fully exploit the sensing c...
Tingxin Yan, Vikas Kumar, Deepak Ganesan
TITS
2011
165views more  TITS 2011»
13 years 5 days ago
Robust Inference of Principal Road Paths for Intelligent Transportation Systems
Abstract—Over the last few years, electronic vehicle guidance systems have become increasingly more popular. However, despite their ubiquity, performance will always be subject t...
Gabriel Agamennoni, Juan Nieto, Eduardo Mario Nebo...
CCS
2006
ACM
13 years 9 months ago
Secure function evaluation with ordered binary decision diagrams
Privacy-preserving protocols allow multiple parties with private inputs to perform joint computation while preserving the privacy of their respective inputs. An important cryptogr...
Louis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh