Sciweavers

1308 search results - page 131 / 262
» Bayesian Algorithmic Mechanism Design
Sort
View
94
Voted
CORR
2010
Springer
60views Education» more  CORR 2010»
15 years 24 days ago
A Novel Scheme for Secured Data Transfer Over Computer Networks
: This paper presents a novel encryption-less algorithm to enhance security in transmission of data in networks. The algorithm uses an intuitively simple idea of a `jigsaw puzzle&#...
Rangarajan Vasudevan, Ajith Abraham, Sugata Sanyal
140
Voted
MOBISYS
2009
ACM
16 years 1 months ago
R2D2: regulating beam shape and rate as directionality meets diversity
We design, implement, and evaluate a vehicular communication system that improves uplink connectivity through multi-lobe beam pattern switching on a smart antenna. Directionality ...
Kishore Ramachandran, Ravi Kokku, Karthikeyan Sund...
INFOCOM
2009
IEEE
15 years 7 months ago
Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints
Continuous monitoring and diagnosis of network performance are of crucial importance for the Internet access service and virtual private network (VPN) service providers. Various o...
Yao Zhao, Zhaosheng Zhu, Yan Chen, Dan Pei, Jia Wa...
124
Voted
CCS
2009
ACM
15 years 7 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
86
Voted
MOBICOM
2006
ACM
15 years 6 months ago
Fast and reliable estimation schemes in RFID systems
RFID tags are being used in many diverse applications in increasingly large numbers. These capabilities of these tags span from very dumb passive tags to smart active tags, with t...
Murali S. Kodialam, Thyaga Nandagopal