Sciweavers

2503 search results - page 475 / 501
» Building Computer Network Attacks
Sort
View
IEEEPACT
1998
IEEE
15 years 6 months ago
Sirocco: Cost-Effective Fine-Grain Distributed Shared Memory
Software fine-grain distributed shared memory (FGDSM) provides a simplified shared-memory programming interface with minimal or no hardware support. Originally software FGDSMs tar...
Ioannis Schoinas, Babak Falsafi, Mark D. Hill, Jam...
PERCOM
2010
ACM
15 years 6 months ago
Tuning to your position: FM radio based indoor localization with spontaneous recalibration
—Position of mobile users has become highly important information in pervasive computing environments. Indoor localization systems based on Wi-Fi signal strength fingerprinting t...
Aleksandar Matic, Andrei Papliatseyeu, Venet Osman...
134
Voted
SODA
1998
ACM
157views Algorithms» more  SODA 1998»
15 years 3 months ago
A Polynomial Time Approximation Scheme for Minimum Routing Cost Spanning Trees
Given an undirected graph with nonnegative costs on the edges, the routing cost of any of its spanning trees is the sum over all pairs of vertices of the cost of the path between t...
Bang Ye Wu, Giuseppe Lancia, Vineet Bafna, Kun-Mao...
217
Voted
HOTI
2011
IEEE
14 years 2 months ago
The Common Communication Interface (CCI)
—There are many APIs for connecting and exchanging data between network peers. Each interface varies wildly based on metrics including performance, portability, and complexity. S...
Scott Atchley, David Dillow, Galen M. Shipman, Pat...
165
Voted
CONEXT
2009
ACM
15 years 3 months ago
Cool-Tether: energy efficient on-the-fly wifi hot-spots using mobile phones
We consider the problem of providing ubiquitous yet affordable Internet connectivity to devices at home, at work, and on the move. In this context, we take advantage of two signif...
Ashish Sharma, Vishnu Navda, Ramachandran Ramjee, ...