Sciweavers

10396 search results - page 1852 / 2080
» Deployment Support Network
Sort
View
149
Voted
CORR
2010
Springer
184views Education» more  CORR 2010»
15 years 3 months ago
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the s...
Xiang He, Aylin Yener
INFORMATICALT
2010
119views more  INFORMATICALT 2010»
15 years 2 months ago
Tight Arrival Curve at the Output of a Work-Conserving Blind Multiplexing Server
Abstract. As a means of supporting quality of service guarantees, aggregate multiplexing has attracted a lot of attention in the networking community, since it requires less comple...
Juan Echagüe, Vicent Cholvi
152
Voted
WABI
2010
Springer
167views Bioinformatics» more  WABI 2010»
15 years 2 months ago
Quantifying the Strength of Natural Selection of a Motif Sequence
Quantification of selective pressures on regulatory sequences is a central question in studying the evolution of gene regulatory networks. Previous methods focus primarily on sing...
Chen-Hsiang Yeang
SENSYS
2010
ACM
15 years 1 months ago
Cooperative transit tracking using smart-phones
Real-time transit tracking is gaining popularity as a means for transit agencies to improve the rider experience. However, many transit agencies lack either the funding or initiat...
Arvind Thiagarajan, James Biagioni, Tomas Gerlich,...
129
Voted
SENSYS
2010
ACM
15 years 1 months ago
AutoWitness: locating and tracking stolen property while tolerating GPS and radio outages
We present AutoWitness, a system to deter, detect, and track personal property theft, improve historically dismal stolen property recovery rates, and disrupt stolen property distr...
Santanu Guha, Kurt Plarre, Daniel Lissner, Somnath...
« Prev « First page 1852 / 2080 Last » Next »