Sciweavers

2338 search results - page 375 / 468
» Community computing and the computing community
Sort
View
153
Voted
TPDS
2010
112views more  TPDS 2010»
15 years 1 months ago
Resource Scheduling in Wireless Networks Using Directional Antennas
—Due to a continued increase in the speed and capacities of computing devices, combined with our society’s growing need for mobile communication capabilities, multihop wireless...
Imad Jawhar, Jie Wu, Dharma P. Agrawal
WINET
2010
129views more  WINET 2010»
15 years 1 months ago
Characterizing 802.11 wireless link behavior
Since wireless signals propagate through the ether, they are significantly affected by attenuation, fading, multipath, and interference. As a result, it is difficult to measure ...
Glenn Judd, Peter Steenkiste
ACSAC
2010
IEEE
15 years 1 months ago
Analyzing and improving Linux kernel memory protection: a model checking approach
Code injection continues to pose a serious threat to computer systems. Among existing solutions, W X is a notable approach to prevent the execution of injected code. In this paper...
Siarhei Liakh, Michael C. Grace, Xuxian Jiang
GIS
2010
ACM
15 years 1 months ago
Kernelized map matching
Map matching is a fundamental operation in many applications such as traffic analysis and location-aware services, the killer apps for ubiquitous computing. In the past, several m...
Ahmed Jawad, Kristian Kersting
SIN
2010
ACM
15 years 1 months ago
A calculus for the qualitative risk assessment of policy override authorization
Policy override is gaining traction in the research community to improve the efficiency and usability of authorization mechanisms. These mechanisms turn the conventional privilege...
Steffen Bartsch