Sciweavers

7839 search results - page 1524 / 1568
» What's there and what's not
Sort
View
109
Voted
IEEECIT
2010
IEEE
14 years 11 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
102
Voted
IGPL
2010
161views more  IGPL 2010»
14 years 11 months ago
Extending the Hegselmann-Krause Model I
Hegselmann and Krause have developed a simple yet powerful computational model for studying the opinion dynamics in societies of epistemically interacting truth-seeking agents. We...
Igor Douven, Alexander Riegler
118
Voted
INFOCOM
2010
IEEE
14 years 11 months ago
The Capacity of Heterogeneous Wireless Networks
—Although capacity has been extensively studied in wireless networks, most of the results are for homogeneous wireless networks where all nodes are assumed identical. In this pap...
Pan Li, Yuguang Fang
88
Voted
INFOCOM
2010
IEEE
14 years 11 months ago
A Framework for Joint Network Coding and Transmission Rate Control in Wireless Networks
—Network coding has been proposed as a technique that can potentially increase the transport capacity of a wireless network via processing and mixing of data packets at intermedi...
Tae-Suk Kim, Serdar Vural, Ioannis Broustis, Dimit...
100
Voted
INFOCOM
2010
IEEE
14 years 11 months ago
Improving QoS in BitTorrent-like VoD Systems
—In recent years a number of research efforts have focused on effective use of P2P-based systems in providing large scale video streaming services. In particular, live streaming ...
Yan Yang, Alix L. H. Chow, Leana Golubchik, Daniel...
« Prev « First page 1524 / 1568 Last » Next »