Sciweavers

3657 search results - page 595 / 732
» A Study of Practical Deduplication
Sort
View
INFOCOM
2011
IEEE
14 years 1 months ago
Transport throughput of secondary networks in spectrum sharing systems
—Spectrum sharing systems such as cognitive radio networks have drawn much attention recently due to their potential to resolve the conflict between increasing demand for spectr...
Chengzhi Li, Huaiyu Dai
INFOCOM
2011
IEEE
14 years 1 months ago
Consolidating virtual machines with dynamic bandwidth demand in data centers
—Recent advances in virtualization technology have made it a common practice to consolidate virtual machines(VMs) into a fewer number of servers. An efficient consolidation sche...
Meng Wang, Xiaoqiao Meng, Li Zhang 0002
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
14 years 1 months ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
CHI
2011
ACM
14 years 1 months ago
User-defined motion gestures for mobile interaction
Modern smartphones contain sophisticated sensors to monitor three-dimensional movement of the device. These sensors permit devices to recognize motion gestures— deliberate movem...
Jaime Ruiz, Yang Li, Edward Lank
CHI
2011
ACM
14 years 1 months ago
Donate for credibility: how contribution incentives can improve credibility
This study explores whether certain contribution incentives for online user-generated content can undermine or enhance contributor’s credibility. Through an online experiment, w...
Gary Hsieh, Scott E. Hudson, Robert E. Kraut