Sciweavers

10901 search results - page 2122 / 2181
» Approximations in Distributed Optimization
Sort
View
INFOCOM
2006
IEEE
15 years 9 months ago
Eclipse Attacks on Overlay Networks: Threats and Defenses
Abstract— Overlay networks are widely used to deploy functionality at edge nodes without changing network routers. Each node in an overlay network maintains connections with a nu...
Atul Singh, Tsuen-Wan Ngan, Peter Druschel, Dan S....
ISCA
2006
IEEE
154views Hardware» more  ISCA 2006»
15 years 9 months ago
SODA: A Low-power Architecture For Software Radio
The physical layer of most wireless protocols is traditionally implemented in custom hardware to satisfy the heavy computational requirements while keeping power consumption to a ...
Yuan Lin, Hyunseok Lee, Mark Woh, Yoav Harel, Scot...
P2P
2006
IEEE
211views Communications» more  P2P 2006»
15 years 9 months ago
Comparison of Image Similarity Queries in P2P Systems
Given some of the recent advances in Distributed Hash Table (DHT) based Peer-To-Peer (P2P) systems we ask the following questions: Are there applications where unstructured querie...
Wolfgang Müller 0002, P. Oscar Boykin, Nima S...
159
Voted
RTSS
2006
IEEE
15 years 9 months ago
Design of Location Service for a Hybrid Network of Mobile Actors and Static Sensors
Location services are essential to many applications running on a hybrid of wirelessly-networked mobile actors and static sensors, such as surveillance systems and the Pursuer and...
Zhigang Chen, Min Gyu Cho, Kang G. Shin
ASSETS
2006
ACM
15 years 9 months ago
The vocal joystick: : evaluation of voice-based cursor control techniques
Mouse control has become a crucial aspect of many modern day computer interactions. This poses a challenge for individuals with motor impairments or those whose use of hands are r...
Susumu Harada, James A. Landay, Jonathan Malkin, X...
« Prev « First page 2122 / 2181 Last » Next »