Sciweavers

11325 search results - page 2154 / 2265
» Active Model Selection
Sort
View
128
Voted
MOBISYS
2008
ACM
16 years 3 months ago
Composcan: adaptive scanning for efficient concurrent communications and positioning with 802.11
Using 802.11 concurrently for communications and positioning is problematic, especially if location-based services (e.g., indoor navigation) are concurrently executed with real-ti...
Mikkel Baun Kjærgaard, Thomas King
180
Voted
MOBIHOC
2007
ACM
16 years 3 months ago
Bounds for the capacity of wireless multihop networks imposed by topology and demand
Existing work on the capacity of wireless networks predominantly considers homogeneous random networks with random work load. The most relevant bounds on the network capacity, e.g...
Alireza Keshavarz-Haddad, Rudolf H. Riedi
144
Voted
MOBIHOC
2005
ACM
16 years 3 months ago
On the node-scheduling approach to topology control in ad hoc networks
: In this paper, we analyze the node scheduling approach of topology control in the context of reliable packet delivery. In node scheduling, only a minimum set of nodes needed for ...
Budhaditya Deb, Badri Nath
123
Voted
WISEC
2010
ACM
15 years 10 months ago
pBMDS: a behavior-based malware detection system for cellphone devices
Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware no...
Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Senc...
132
Voted
HICSS
2010
IEEE
171views Biometrics» more  HICSS 2010»
15 years 10 months ago
Developing Reliable Measures of Privacy Management within Social Networking Sites
Social networking sites and other examples of online social spaces have greatly expanded their members’ opportunities for self expression and social interaction, while creating ...
Catherine Dwyer, Starr Roxanne Hiltz, Marshall Sco...
« Prev « First page 2154 / 2265 Last » Next »