Sciweavers

1124 search results - page 174 / 225
» Hidden Market Design
Sort
View
UIST
2009
ACM
15 years 6 months ago
Mining web interactions to automatically create mash-ups
The deep web contains an order of magnitude more information than the surface web, but that information is hidden behind the web forms of a large number of web sites. Metasearch e...
Jeffrey P. Bigham, Ryan S. Kaminsky, Jeffrey Nicho...
INFOCOM
2008
IEEE
15 years 6 months ago
Capacity of Asynchronous Random-Access Scheduling in Wireless Networks
Abstract—We study the throughput capacity of wireless networks which employ (asynchronous) random-access scheduling as opposed to deterministic scheduling. The central question w...
Deepti Chafekar, Dave Levin, V. S. Anil Kumar, Mad...
IPPS
2008
IEEE
15 years 6 months ago
Introducing gravel: An MPI companion library
A non-trivial challenge in high performance, cluster computing is the communication overhead introduced by the cluster interconnect. A common strategy for addressing this challeng...
Anthony Danalis, Aaron Brown, Lori L. Pollock, D. ...
ICC
2007
IEEE
129views Communications» more  ICC 2007»
15 years 6 months ago
Source Controlled Modulation Scheme for Sources with Memory
— Given an AWGN channel, we look at the problem of designing a source controlled binary antipodal signaling system for transmitting blocks of binary symbols generated either by a...
Pedro M. Crespo, Estibaliz Loyo, Javier Del Ser, C...
IPCCC
2007
IEEE
15 years 6 months ago
Detecting Misused Keys in Wireless Sensor Networks
Key management is the cornerstone for secure communication in sensor networks. Researchers have recently developed many techniques to setup pairwise keys between sensor nodes. How...
Donggang Liu, Qi Dong