Sciweavers

6607 search results - page 1241 / 1322
» Making TeX Work
Sort
View
CONEXT
2009
ACM
14 years 11 months ago
RFDump: an architecture for monitoring the wireless ether
Networking researchers have been using tools like wireshark and tcpdump to sniff packets on physical links that use different types of datalink protocols, e.g. Ethernet or 802.11,...
Kaushik Lakshminarayanan, Samir Sapra, Srinivasan ...
CONEXT
2009
ACM
14 years 11 months ago
The age of impatience: optimal replication schemes for opportunistic networks
: We study mobile P2P content dissemination schemes which leverage the local dedicated caches provided by hand-held devices (e.g., smart-phones, PDAs) and opportunistic contacts be...
Joshua Reich, Augustin Chaintreau
HUC
2010
Springer
14 years 11 months ago
Groupthink: usability of secure group association for wireless devices
A fairly common modern setting entails users, each in possession of a personal wireless device, wanting to communicate securely, via their devices. If these users (and their devic...
Rishab Nithyanand, Nitesh Saxena, Gene Tsudik, Ers...
GECCO
2008
Springer
152views Optimization» more  GECCO 2008»
14 years 11 months ago
Combatting financial fraud: a coevolutionary anomaly detection approach
A major difficulty for anomaly detection lies in discovering boundaries between normal and anomalous behavior, due to the deficiency of abnormal samples in the training phase. In...
Shelly Xiaonan Wu, Wolfgang Banzhaf
GECCO
2008
Springer
130views Optimization» more  GECCO 2008»
14 years 11 months ago
VoIP speech quality estimation in a mixed context with genetic programming
Voice over IP (VoIP) speech quality estimation is crucial to providing optimal Quality of Service (QoS). This paper seeks to provide improved speech quality estimation models with...
Adil Raja, R. Muhammad Atif Azad, Colin Flanagan, ...
« Prev « First page 1241 / 1322 Last » Next »