Sciweavers

3735 search results - page 633 / 747
» Order compression schemes
Sort
View
96
Voted
DASFAA
2007
IEEE
191views Database» more  DASFAA 2007»
15 years 4 months ago
ABIDE: A Bid-Based Economic Incentive Model for Enticing Non-cooperative Peers in Mobile-P2P Networks
In mobile ad-hoc peer-to-peer (M-P2P) networks, a large percentage of the mobile peers typically do not provide any service to the network, thereby motivating incentive schemes for...
Anirban Mondal, Sanjay Kumar Madria, Masaru Kitsur...
ECRIME
2007
15 years 4 months ago
Behavioral response to phishing risk
Tools that aim to combat phishing attacks must take into account how and why people fall for them in order to be effective. This study reports a pilot survey of 232 computer users...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
115
Voted
ECWEB
2007
Springer
155views ECommerce» more  ECWEB 2007»
15 years 4 months ago
A Secure Payment Protocol for Restricted Connectivity Scenarios in M-Commerce
A significant number of mobile payment systems have been proposed in recent years, most of them based on a scenario where all the entities are directly connected one to another (fo...
Jesús Téllez Isaac, José Sier...
133
Voted
HPCC
2007
Springer
15 years 4 months ago
An Exploration of Performance Attributes for Symbolic Modeling of Emerging Processing Devices
Vector, emerging (homogenous and heterogeneous) multi-core and a number of accelerator processing devices potentially offer an order of magnitude speedup for scientific application...
Sadaf R. Alam, Nikhil Bhatia, Jeffrey S. Vetter
GLOBECOM
2009
IEEE
15 years 4 months ago
Distributed Power and Carrier Allocation in Multibeam Satellite Uplink with Individual SINR Constraints
Abstract--Current multibeam satellite systems perform centralized power and carrier allocation assuming a Multi-Frequency Time Division Multiple Access (MF-TDMA) scheme with fixed ...
J. E. Barcelo-Llado, Maria Angeles Vázquez-...