Sciweavers

1647 search results - page 289 / 330
» Distributing private data in challenged network environments
Sort
View
JSAC
2010
99views more  JSAC 2010»
14 years 10 months ago
Robust wireless video streaming using hybrid spatial/temporal retransmission
—Bandwidth demands and timing constraints are two major challenges for wireless video streaming applications. In this paper, we present a hybrid spatial/temporal retransmission p...
Mei-Hsuan Lu, Peter Steenkiste, Tsuhan Chen
SIGOPSE
2004
ACM
15 years 5 months ago
Long-term time-share guarantees are necessary for wireless LANs
Wireless local area networks (WLANs) based on a family of 802.11 technologies are becoming ubiquitous. These technologies support multiple data transmission rates. Transmitting at...
Godfrey Tan, John V. Guttag
CLOUD
2010
ACM
15 years 4 months ago
Fluxo: a system for internet service programming by non-expert developers
Over the last 10–15 years, our industry has developed and deployed many large-scale Internet services, from e-commerce to social networking sites, all facing common challenges i...
Emre Kiciman, V. Benjamin Livshits, Madanlal Musuv...
MOBISYS
2009
ACM
16 years 11 days ago
Predictive methods for improved vehicular WiFi access
With the proliferation of WiFi technology, many WiFi networks are accessible from vehicles on the road making vehicular WiFi access realistic. However, several challenges exist: l...
Pralhad Deshpande, Anand Kashyap, Chul Sung, Samir...
CCS
2010
ACM
14 years 9 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...