Sciweavers

7486 search results - page 1452 / 1498
» The Limits of Quantum Computers
Sort
View
97
Voted
SIGCOMM
2010
ACM
15 years 21 days ago
Data center TCP (DCTCP)
Cloud data centers host diverse applications, mixing workloads that require small predictable latency with others requiring large sustained throughput. In this environment, today&...
Mohammad Alizadeh, Albert G. Greenberg, David A. M...
122
Voted
SIGCOMM
2010
ACM
15 years 21 days ago
An analysis of social network-based Sybil defenses
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...
117
Voted
SIGCOMM
2010
ACM
15 years 21 days ago
On the forwarding capability of mobile handhelds for video streaming over MANETs
Despite the importance of real-world experiments, nearly all ongoing research activities addressing video streaming over MANETs are based on simulation studies. Earlier research s...
Stein Kristiansen, Morten Lindeberg, Daniel Rodr&i...
146
Voted
SIGCOMM
2010
ACM
15 years 21 days ago
Trust no one: a decentralized matching service for privacy in location based services
We propose a new approach to ensure privacy in location based services, without requiring any support from a"trusted" entity. We observe that users of location based ser...
Sharad Jaiswal, Animesh Nandi
90
Voted
ADHOC
2007
102views more  ADHOC 2007»
15 years 19 days ago
On the capacity of the single source multiple relay single destination mesh network
In this paper, we derive the information theoretic capacity of a special class of mesh networks. A mesh network is a heterogeneous wireless network in which the transmission among...
Lawrence Ong, Mehul Motani
« Prev « First page 1452 / 1498 Last » Next »