Sciweavers

2120 search results - page 422 / 424
» Management and Sharing of Bibliographies
Sort
View
160
Voted
IMC
2010
ACM
14 years 11 months ago
Listen to me if you can: tracking user experience of mobile network on social media
Social media sites such as Twitter continue to grow at a fast pace. People of all generations use social media to exchange messages and share experiences of their life in a timely...
Tongqing Qiu, Junlan Feng, Zihui Ge, Jia Wang, Jun...
131
Voted
IMC
2010
ACM
14 years 11 months ago
Network tomography on correlated links
Network tomography establishes linear relationships between the characteristics of individual links and those of end-toend paths. It has been proved that these relationships can b...
Denisa Ghita, Katerina J. Argyraki, Patrick Thiran
133
Voted
AISS
2010
117views more  AISS 2010»
14 years 11 months ago
A Geospatial Service Approach towards the Development of a Debris Flow Early-warning Systems
Disaster prevention and management is a complicated task that often involves a tremendous volume of heterogeneous data from various resources. With its dynamic and distributed nat...
Min-Lang Huang, Jung-Hong Hong
139
Voted
IPPS
2010
IEEE
14 years 11 months ago
Runtime checking of serializability in software transactional memory
Abstract--Ensuring the correctness of complex implementations of software transactional memory (STM) is a daunting task. Attempts have been made to formally verify STMs, but these ...
Arnab Sinha, Sharad Malik
CORR
2010
Springer
177views Education» more  CORR 2010»
14 years 10 months ago
AntiJam: Efficient Medium Access despite Adaptive and Reactive Jamming
Abstract--Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often ...
Andréa W. Richa, Christian Scheideler, Stef...