Sciweavers

182 search results - page 29 / 37
» Survey on anonymous communications in computer networks
Sort
View
PODC
2010
ACM
15 years 1 months ago
Distributed algorithms for edge dominating sets
An edge dominating set for a graph G is a set D of edges such that each edge of G is in D or adjacent to at least one edge in D. This work studies deterministic distributed approx...
Jukka Suomela
99
Voted
ACMICEC
2003
ACM
144views ECommerce» more  ACMICEC 2003»
15 years 2 months ago
Security model for a multi-agent marketplace
A multi-agent marketplace, MAGNET (Multi AGent Negotiation Testbed), is a promising solution to conduct online combinatorial auctions. The trust model of MAGNET is somewhat diffe...
Ashutosh Jaiswal, Yongdae Kim, Maria L. Gini
CHI
2011
ACM
14 years 1 months ago
Social capital on facebook: differentiating uses and users
Though social network site use is often treated as a monolithic activity, in which all time is equally “social” and its impact the same for all users, we examine how Facebook ...
Moira Burke, Robert Kraut, Cameron Marlow
CCGRID
2006
IEEE
15 years 3 months ago
An Overview of Security Issues in Cluster Interconnects
— Widespread use of cluster systems in diverse set of applications has spurred significant interest in providing high performance cluster interconnects. A major inefficiency in...
Manhee Lee, Eun Jung Kim, Ki Hwan Yum, Mazin S. Yo...
CCR
2010
162views more  CCR 2010»
14 years 9 months ago
Radio resource management considerations for LTE Femto cells
Femtocell access points (FAPs), also popularly known as Home Base Stations, are small base stations for use within indoor environments to improve coverage and capacity. FAPs have ...
Parag Kulkarni, Woon Hau Chin, Tim Farnham