Sciweavers

1124 search results - page 141 / 225
» Hidden Market Design
Sort
View
SIGCOMM
2009
ACM
15 years 6 months ago
In defense of wireless carrier sense
Carrier sense is often used to regulate concurrency in wireless medium access control (MAC) protocols, balancing interference protection and spatial reuse. Carrier sense is known ...
Micah Z. Brodsky, Robert T. Morris
VTC
2008
IEEE
135views Communications» more  VTC 2008»
15 years 6 months ago
MACA-MN: A MACA-Based MAC Protocol for Underwater Acoustic Networks with Packet Train for Multiple Neighbors
Abstract— Unlike the terrestrial wireless networks that utilize the radio channel, underwater networks use the acoustic channel, which poses research challenges in the medium acc...
Nitthita Chirdchoo, Wee-Seng Soh, Kee Chaing Chua
UIST
2006
ACM
15 years 5 months ago
Viz: a visual analysis suite for explaining local search behavior
NP-hard combinatorial optimization problems are common in real life. Due to their intractability, local search algorithms are often used to solve such problems. Since these algori...
Steven Halim, Roland H. C. Yap, Hoong Chuin Lau
IH
2004
Springer
15 years 5 months ago
Information Hiding in Finite State Machine
In this paper, we consider how to hide information into finite state machine (FSM), one of the popular computation models. The key advantage of hiding information in FSM is that t...
Lin Yuan, Gang Qu
ISMIR
2004
Springer
179views Music» more  ISMIR 2004»
15 years 5 months ago
Industrial audio fingerprinting distributed system with CORBA and Web Services
With digital technologies, music content providers face serious challenges to protect their rights. Due to the widespread nature of music sources, it is very difficult to central...
Jose Pedro, Vadim Tarasov, Eloi Batlle, Enric Guau...