Sciweavers

10044 search results - page 1916 / 2009
» Authentication in Wireless Networks
Sort
View
EUROSYS
2006
ACM
16 years 1 months ago
Experiences in building and operating ePOST, a reliable peer-to-peer application
Peer-to-peer (p2p) technology can potentially be used to build highly reliable applications without a single point of failure. However, most of the existing applications, such as ...
Alan Mislove, Ansley Post, Andreas Haeberlen, Pete...
WECWIS
2003
IEEE
205views ECommerce» more  WECWIS 2003»
15 years 9 months ago
Beyond "web of trust": Enabling P2P E-commerce
The huge success of eBay has proven the demand for customer-to-customer (C2C) electronic commerce. eBay is a centralized infrastructure with all its scalability problems (network ...
Anwitaman Datta, Manfred Hauswirth, Karl Aberer
WWW
2007
ACM
16 years 5 months ago
Life is sharable: mechanisms to support and sustain blogging life experience
Recent trend in the development of mobile devices, wireless communications, sensor technologies, weblogs, and peer-to-peer communications have prompted a new design opportunity fo...
Yun-Maw Cheng, Tzu-Chuan Chou, Wai Yu, Li-Chieh Ch...
CHI
2001
ACM
16 years 4 months ago
ConNexus to awarenex: extending awareness to mobile users
We explored the use of awareness information to facilitate communication by developing a series of prototypes. The ConNexus prototype integrates awareness information, instant mes...
John C. Tang, Nicole Yankelovich, James Begole, Ma...
INFOCOM
2009
IEEE
15 years 11 months ago
Dynamic Power Allocation Under Arbitrary Varying Channels - An Online Approach
—A major problem in wireless networks is coping with limited resources, such as bandwidth and energy. These issues become a major algorithmic challenge in view of the dynamic nat...
Niv Buchbinder, Liane Lewin-Eytan, Ishai Menache, ...
« Prev « First page 1916 / 2009 Last » Next »