Sciweavers

1102 search results - page 76 / 221
» Interference and Communications among Active Network Applica...
Sort
View
104
Voted
INFOCOM
2006
IEEE
15 years 6 months ago
Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation, and Applications
— A key function for network traffic monitoring and analysis is the ability to perform aggregate queries over multiple data streams. Change detection is an important primitive w...
Robert T. Schweller, Zhichun Li, Yan Chen, Yan Gao...
SECON
2007
IEEE
15 years 6 months ago
Facilitating an Active Transmit-only RFID System Through Receiver-based Processing
— Many asset tracking applications demand long-lived, low-cost, and continuous monitoring of a large number of items, which has posed a significant challenge to today’s RFID d...
Yu Zhang, Gautam D. Bhanage, Wade Trappe, Yanyong ...
168
Voted
SIGMETRICS
2011
ACM
296views Hardware» more  SIGMETRICS 2011»
14 years 3 months ago
Cellular data network infrastructure characterization and implication on mobile content placement
Despite the tremendous growth in the cellular data network usage due to the popularity of smartphones, so far there is rather limited understanding of the network infrastructure o...
Qiang Xu, Junxian Huang, Zhaoguang Wang, Feng Qian...
93
Voted
INFOCOM
2009
IEEE
15 years 7 months ago
Power Controlled Scheduling with Consecutive Transmission Constraints: Complexity Analysis and Algorithm Design
Abstract—We study the joint power control and minimumframe-length scheduling problem in wireless networks, under the physical interference model and subject to consecutive transm...
Liqun Fu, Soung Chang Liew, Jianwei Huang
92
Voted
CSCW
2010
ACM
15 years 9 months ago
Is it really about me?: message content in social awareness streams
In this work we examine the characteristics of social activity and patterns of communication on Twitter, a prominent example of the emerging class of communication systems we call...
Mor Naaman, Jeffrey Boase, Chih-Hui Lai