Sciweavers

58 search results - page 10 / 12
» Exploiting Sparse User Activity in Multiuser Detection
Sort
View
GIS
2009
ACM
13 years 8 months ago
Opportunistic sampling in wireless sensor networks
In an active WSN where user queries are regularly processed, a significant proportion of nodes relay and overhear data generated by other nodes in the network. In this paper, we ...
Muhammad Umer, Egemen Tanin, Lars Kulik
ICASSP
2009
IEEE
14 years 15 hour ago
Beacon-assisted spectrum access with cooperative cognitive transmitter and receiver
—Spectrum access is an important function of cognitive radios for detecting and utilizing spectrum holes without harming the legacy systems. In this paper, we propose novel coope...
Ali Tajer, Xiaodong Wang
WIMOB
2008
IEEE
13 years 11 months ago
VENETA: Serverless Friend-of-Friend Detection in Mobile Social Networking
—Recently, mobile social software has become an active area of research and development. A multitude of systems have been proposed over the past years that try to follow the succ...
Marco von Arb, Matthias Bader, Michael Kuhn 0002, ...
ACSAC
2010
IEEE
13 years 2 months ago
Detecting spammers on social networks
Social networking has become a popular way for users to meet and interact online. Users spend a significant amount of time on popular social network platforms (such as Facebook, M...
Gianluca Stringhini, Christopher Kruegel, Giovanni...
TELSYS
2010
147views more  TELSYS 2010»
12 years 12 months ago
A new worm propagation threat in BitTorrent: modeling and analysis
Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting thes...
Sinan Hatahet, Abdelmadjid Bouabdallah, Yacine Cha...