Sciweavers

7544 search results - page 1347 / 1509
» Network Forensics Analysis
Sort
View
MM
2006
ACM
184views Multimedia» more  MM 2006»
15 years 10 months ago
Extraction of social context and application to personal multimedia exploration
Personal media collections are often viewed and managed along the social dimension, the places we spend time at and the people we see, thus tools for extracting and using this inf...
Brett Adams, Dinh Q. Phung, Svetha Venkatesh
MOBICOM
2006
ACM
15 years 10 months ago
Fast and reliable estimation schemes in RFID systems
RFID tags are being used in many diverse applications in increasingly large numbers. These capabilities of these tags span from very dumb passive tags to smart active tags, with t...
Murali S. Kodialam, Thyaga Nandagopal
SAC
2006
ACM
15 years 10 months ago
Building the functional performance model of a processor
In this paper, we present an efficient procedure for building a piecewise linear function approximation of the speed function of a processor with hierarchical memory structure. Th...
Alexey L. Lastovetsky, Ravi Reddy, Robert Higgins
139
Voted
SIGECOM
2006
ACM
138views ECommerce» more  SIGECOM 2006»
15 years 10 months ago
Bid expressiveness and clearing algorithms in multiattribute double auctions
We investigate the space of two-sided multiattribute auctions, focusing on the relationship between constraints on the offers traders can express through bids, and the resulting c...
Yagil Engel, Michael P. Wellman, Kevin M. Lochner
SIGMETRICS
2006
ACM
128views Hardware» more  SIGMETRICS 2006»
15 years 10 months ago
Partially overlapped channels not considered harmful
Many wireless channels in different technologies are known to have partial overlap. However, due to the interference effects among such partially overlapped channels, their simult...
Arunesh Mishra, Vivek Shrivastava, Suman Banerjee,...
« Prev « First page 1347 / 1509 Last » Next »