Sciweavers

149 search results - page 20 / 30
» Commercially Viable Active Networking
Sort
View
DIALM
2004
ACM
161views Algorithms» more  DIALM 2004»
15 years 5 months ago
Batch conflict resolution algorithm with progressively accurate multiplicity estimation
The wireless connectivity, essential for pervasive computing, has ephemeral character and can be used for creating ad hoc networks, sensor networks, connection with RFID tags etc....
Petar Popovski, Frank H. P. Fitzek, Ramjee Prasad
WECWIS
1999
IEEE
164views ECommerce» more  WECWIS 1999»
15 years 6 months ago
Effect of Bargaining in Electronic Commerce
Internet business has grown at an unprecedented rate in the past several years. Recent research has found that the functions provided by a store have a significant impact on custo...
Ting-Peng Liang, Her-Sen Doong
DSN
2009
IEEE
15 years 5 months ago
Precise request tracing and performance debugging for multi-tier services of black boxes
As more and more multi-tier services are developed from commercial components or heterogeneous middleware without the source code available, both developers and administrators nee...
Zhihong Zhang, Jianfeng Zhan, Yong Li, Lei Wang, D...
JCP
2008
120views more  JCP 2008»
15 years 1 months ago
Multimedia Resource Replication Strategy for a Pervasive Peer-to-Peer Environment
The computer world is experiencing a paradigm shift towards context-aware pervasive computing, where diverse computer devices communicate with each other through different network ...
Letian Rong
95
Voted
CCS
2007
ACM
15 years 8 months ago
An inquiry into the nature and causes of the wealth of internet miscreants
This paper studies an active underground economy which specializes in the commoditization of activities such as credit card fraud, identity theft, spamming, phishing, online crede...
Jason Franklin, Adrian Perrig, Vern Paxson, Stefan...