Sciweavers

CCR
2010
169views more  CCR 2010»
13 years 4 months ago
On the leakage of personally identifiable information via online social networks
For purposes of this paper, we define "Personally identifiable information" (PII) as information which can be used to distinguish or trace an individual's identity ...
Balachander Krishnamurthy, Craig E. Wills
CCR
2010
202views more  CCR 2010»
13 years 4 months ago
Understanding data center traffic characteristics
As data centers become more and more central in Internet communications, both research and operations communities have begun to explore how to better design and manage them. In th...
Theophilus Benson, Ashok Anand, Aditya Akella, Min...
CCR
2010
111views more  CCR 2010»
13 years 4 months ago
Carving research slices out of your production networks with OpenFlow
Rob Sherwood, Michael Chan, G. Adam Covington, Gle...
CCR
2010
162views more  CCR 2010»
13 years 4 months ago
Radio resource management considerations for LTE Femto cells
Femtocell access points (FAPs), also popularly known as Home Base Stations, are small base stations for use within indoor environments to improve coverage and capacity. FAPs have ...
Parag Kulkarni, Woon Hau Chin, Tim Farnham
CCR
2010
184views more  CCR 2010»
13 years 4 months ago
Characterising temporal distance and reachability in mobile and online social networks
The analysis of social and technological networks has attracted a lot of attention as social networking applications and mobile sensing devices have given us a wealth of real data...
John Tang, Mirco Musolesi, Cecilia Mascolo, Vito L...
CCR
2010
81views more  CCR 2010»
13 years 4 months ago
Internet requests for comments (RFCs) as scholarly publications
This note describes the various peer review processes applied to Internet Requests for Comments (RFCs) over a number of years, and suggests that these have been up to normal schol...
Brian E. Carpenter, Craig Partridge
CCR
2010
203views more  CCR 2010»
13 years 4 months ago
Minimizing energy consumptions in wireless sensor networks via two-modal transmission
We present a sophisticated framework to systematically explore the temporal correlation in environmental monitoring wireless sensor networks. The presented framework optimizes los...
Yao Liang, Wei Peng
CCR
2010
106views more  CCR 2010»
13 years 4 months ago
802.11 with multiple antennas for dummies
The use of multiple antennas and MIMO techniques based on them is the key feature of 802.11n equipment that sets it apart from earlier 802.11a/g equipment. It is responsible for s...
Daniel Halperin, Wenjun Hu, Anmol Sheth, David Wet...
CCR
2010
105views more  CCR 2010»
13 years 4 months ago
A platform for high performance and flexible virtual routers on commodity hardware
Multi-core CPUs, along with recent advances in memory and buses, render commodity hardware a strong candidate for software router virtualization. In this context, we present the d...
Norbert Egi, Adam Greenhalgh, Mark Handley, Micka&...
CCR
2010
82views more  CCR 2010»
13 years 4 months ago
Report on WREN 2009 -- workshop: research on enterprise networking
Nathan Farrington, Nikhil Handigol, Christoph Maye...