Sciweavers

11381 search results - page 2004 / 2277
» Connectivity
Sort
View
SUTC
2008
IEEE
15 years 11 months ago
A Cloaking Algorithm Based on Spatial Networks for Location Privacy
Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred t...
Po-Yi Li, Wen-Chih Peng, Tsung-Wei Wang, Wei-Shinn...
TABLETOP
2008
IEEE
15 years 11 months ago
System design for the WeSpace: Linking personal devices to a table-centered multi-user, multi-surface environment
The WeSpace is a long-term project dedicated to the creation of environments supporting walkup and share collaboration among small groups. The focus of our system design has been ...
Hao Jiang, Daniel Wigdor, Clifton Forlines, Chia S...
TRIDENTCOM
2008
IEEE
15 years 11 months ago
Virtual integrated TCP testbed (VITT)
Research on TCP performance relies either on simulation programs, which run on a single machine, or on the use of real testbeds, where different machines represent different netwo...
Carlo Caini, Rosario Firrincieli, Renzo Davoli, Da...
134
Voted
TRIDENTCOM
2008
IEEE
15 years 11 months ago
Empirical evaluation of VoIP aggregation over a fixed WiMAX testbed
The WiMAX Reference Network Architecture can be used in point-to-point and point-to-multipoint network topologies, and is suitable for providing last-mile, building-to-building, a...
Kostas Pentikousis, Esa Piri, Jarno Pinola, Frerk ...
152
Voted
VTC
2008
IEEE
138views Communications» more  VTC 2008»
15 years 11 months ago
Mobile IP as an Enabling Technology for VoIP in Metropolitan Wireless Mesh Networks
—Metropolitan wireless mesh networks are being deployed to provide broadband connectivity to city-wide hotspots. However, its commercial feasibility and business model have not y...
Andres Arjona, Antti Ylä-Jääski
« Prev « First page 2004 / 2277 Last » Next »