Sciweavers

11580 search results - page 2070 / 2316
» Communication vs. Computation
Sort
View
IJNSEC
2011
110views more  IJNSEC 2011»
14 years 12 months ago
An Anonymous Auction Protocol Based on GDH Assumption
The popularization and conveniences of Internet have changed traditional auction transactions into electronic auction via Internet. In 2006, Chang and Chang proposed an anonymous ...
Fuw-Yi Yang, Cai-Ming Liao
JASIS
2011
98views more  JASIS 2011»
14 years 12 months ago
Hip and trendy: Characterizing emerging trends on Twitter
Twitter, Facebook, and other related systems that we call social awareness streams are rapidly changing the information and communication dynamics of our society. These systems, w...
Mor Naaman, Hila Becker, Luis Gravano
JSAC
2011
191views more  JSAC 2011»
14 years 12 months ago
CRP: A Routing Protocol for Cognitive Radio Ad Hoc Networks
Abstract—Cognitive radio (CR) technology enables the opportunistic use of the vacant licensed frequency bands, thereby improving the spectrum utilization. However, the CR operati...
Kaushik R. Chowdhury, Ian F. Akyildiz
TCOM
2011
92views more  TCOM 2011»
14 years 11 months ago
Bit-Interleaved Coded Modulation with Mismatched Decoding Metrics
Bit-interleaved coded modulation (BICM) has become the de facto coding standard for communication systems. Recently, BICM has been cast as a mismatched decoding scheme due to the ...
Trung Thanh Nguyen 0001, Lutz H.-J. Lampe
HOTNETS
2010
14 years 11 months ago
Using strongly typed networking to architect for tussle
Today's networks discriminate towards or against traffic for a wide range of reasons, and in response end users and their applications increasingly attempt to evade monitorin...
Chitra Muthukrishnan, Vern Paxson, Mark Allman, Ad...
« Prev « First page 2070 / 2316 Last » Next »