Sciweavers

280 search results - page 56 / 56
» Pricing in Network Effect Markets
Sort
View
CCS
2009
ACM
14 years 5 months ago
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM wh...
Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui ...
PODS
2009
ACM
119views Database» more  PODS 2009»
14 years 5 months ago
Exceeding expectations and clustering uncertain data
Database technology is playing an increasingly important role in understanding and solving large-scale and complex scientific and societal problems and phenomena, for instance, un...
Sudipto Guha, Kamesh Munagala
ISCI
2006
145views more  ISCI 2006»
13 years 5 months ago
Processing count queries over event streams at multiple time granularities
Management and analysis of streaming data has become crucial with its applications in web, sensor data, network traffic data, and stock market. Data streams consist of mostly nume...
Aykut Ünal, Yücel Saygin, Özgü...
TMC
2008
159views more  TMC 2008»
13 years 3 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
CORR
2011
Springer
181views Education» more  CORR 2011»
13 years 7 days ago
Contract-Based Cooperative Spectrum Sharing
—Providing proper economic incentives is essential for the success of dynamic spectrum sharing. Cooperative spectrum sharing is one effective way to achieve this goal. In coopera...
Lingjie Duan, Lin Gao, Jianwei Huang