Sciweavers

3686 search results - page 606 / 738
» Comprehensive comprehensions
Sort
View
INFOCOM
2009
IEEE
15 years 8 months ago
Physical Interference Modeling for Transmission Scheduling on Commodity WiFi Hardware
—The demand for capacity in WiFi networks is driving a new look at transmission scheduling based link layers, particularly in the context of mesh networks. One basic issue here i...
Ritesh Maheshwari, Jing Cao, Samir R. Das
INFOCOM
2009
IEEE
15 years 8 months ago
Using NEMO to Support the Global Reachability of MANET Nodes
—Mobile Ad hoc Network (MANET) routing protocols have been the focus of an accomplished research effort for many years within the networking community and now the results of this...
Ben McCarthy, Christopher Edwards, Martin Dunmore
INFOCOM
2009
IEEE
15 years 8 months ago
Distilling Superior Peers in Large-Scale P2P Streaming Systems
Abstract—In large-scale peer-to-peer (P2P) live streaming systems with a limited supply of server bandwidth, increasing the amount of upload bandwidth supplied by peers becomes c...
Zimu Liu, Chuan Wu, Baochun Li, Shuqiao Zhao
IROS
2009
IEEE
137views Robotics» more  IROS 2009»
15 years 8 months ago
A framework for planning comfortable and customizable motion of an assistive mobile robot
Abstract— Assistive mobile robots that can navigate autonomously can greatly benefit people with mobility impairments. Since an assistive mobile robot transports a human user fr...
Shilpa Gulati, Chetan Jhurani, Benjamin Kuipers, R...
120
Voted
ASIACRYPT
2009
Springer
15 years 8 months ago
Foundations of Non-malleable Hash and One-Way Functions
Non-malleability is an interesting and useful property which ensures that a cryptographic protocol preserves the independence of the underlying values: given for example an encryp...
Alexandra Boldyreva, David Cash, Marc Fischlin, Bo...