Sciweavers

11580 search results - page 2109 / 2316
» Communication vs. Computation
Sort
View
CONEXT
2009
ACM
15 years 5 months ago
ARES: an anti-jamming reinforcement system for 802.11 networks
Dense, unmanaged 802.11 deployments tempt saboteurs into launching jamming attacks by injecting malicious interference. Nowadays, jammers can be portable devices that transmit int...
Konstantinos Pelechrinis, Ioannis Broustis, Srikan...
CONEXT
2009
ACM
15 years 5 months ago
Detecting network neutrality violations with causal inference
We present NANO, a system that detects when ISPs apply policies that discriminate against specific classes of applications, users, or destinations. Existing systems for detecting ...
Muhammad Mukarram Bin Tariq, Murtaza Motiwala, Nic...
CONEXT
2009
ACM
15 years 5 months ago
Virtually eliminating router bugs
Software bugs in routers lead to network outages, security vulnerabilities, and other unexpected behavior. Rather than simply crashing the router, bugs can violate protocol semant...
Eric Keller, Minlan Yu, Matthew Caesar, Jennifer R...
HUC
2010
Springer
15 years 5 months ago
EmotionSense: a mobile phones based adaptive platform for experimental social psychology research
Today's mobile phones represent a rich and powerful computing platform, given their sensing, processing and communication capabilities. Phones are also part of the everyday l...
Kiran K. Rachuri, Mirco Musolesi, Cecilia Mascolo,...
MM
2010
ACM
125views Multimedia» more  MM 2010»
15 years 4 months ago
Tenor: making coding practical from servers to smartphones
It has been theoretically shown that performing coding in networked systems, including Reed-Solomon codes, fountain codes, and random network coding, has a clear advantage with re...
Hassan Shojania, Baochun Li
« Prev « First page 2109 / 2316 Last » Next »