Sciweavers

28962 search results - page 118 / 5793
» Computational Mechanism Design
Sort
View
HICSS
2003
IEEE
193views Biometrics» more  HICSS 2003»
15 years 4 months ago
Ambient computing applications: an experience with the SPREAD approach
Todays, we assist to the explosive development of mobile computing devices like PDAs and cell-phones, the integration of embedded intelligence (like Web server) in more and more c...
Paul Couderc, Michel Banâtre
CEC
2007
IEEE
15 years 5 months ago
AIS for misbehavior detection in wireless sensor networks: Performance and design principles
— A sensor network is a collection of wireless devices that are able to monitor physical or environmental conditions. These devices are expected to operate autonomously, be batte...
Martin Drozda, Sven Schaust, Helena Szczerbicka
INFOCOM
2007
IEEE
15 years 5 months ago
On Optimal Physical Carrier Sensing: Theoretical Analysis and Protocol Design
— Traditional Physical Carrier Sensing (PCS), which aims at eliminating hidden terminals in wireless networks, causes too many exposed terminals and deteriorates the throughput p...
Yanfeng Zhu, Qian Zhang, Zhisheng Niu, Jing Zhu
ICRA
1998
IEEE
107views Robotics» more  ICRA 1998»
15 years 3 months ago
Designing Personal Tele-Embodiment
At the intersection of tele-robotics, computer networking, and human social interaction we have chosen to explore an area we identifyas personal tele-embodiment. At the core of th...
Eric Paulos, John F. Canny
CCS
2010
ACM
15 years 3 months ago
Controlling data disclosure in computational PIR protocols
Private Information Retrieval (PIR) protocols allow users to learn data items stored at a server which is not fully trusted, without disclosing to the server the particular data e...
Ning Shang, Gabriel Ghinita, Yongbin Zhou, Elisa B...