Sciweavers

12052 search results - page 1945 / 2411
» computing 2010
Sort
View
INFOCOM
2010
IEEE
15 years 3 months ago
Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue
—Collaborative applications for co-located mobile users can be severely disrupted by a sybil attack to the point of being unusable. Existing decentralized defences have largely b...
Daniele Quercia, Stephen Hailes
JSAC
2010
143views more  JSAC 2010»
15 years 3 months ago
Balancing competing resource allocation demands in a public cellular network that supports emergency services
Abstract—When an emergency happens, public communication networks, including cellular networks, public switched telecommunication networks, and the Internet can be utilized to su...
Jiazhen Zhou, C. Beard
SMC
2010
IEEE
202views Control Systems» more  SMC 2010»
15 years 3 months ago
Evaluating the performance of nonnegative matrix factorization for constructing semantic spaces: Comparison to latent semantic a
—This study examines the ability of nonnegative matrix factorization (NMF) as a method for constructing semantic spaces, in which the meaning of each word is represented by a hig...
Akira Utsumi
SAICSIT
2010
ACM
15 years 2 months ago
Towards energy efficient mobile communications
The rapid growth and development of wireless communication services and applications corresponds to an increase in associated energy consumption. For broadband wireless network de...
Moshe T. Masonta, Mjumo Mzyece, Ntsibane Ntlatlapa
UIST
2010
ACM
15 years 2 months ago
TwinSpace: an infrastructure for cross-reality team spaces
We introduce TwinSpace, a flexible software infrastructure for combining interactive workspaces and collaborative virtual worlds. Its design is grounded in the need to support dee...
Derek F. Reilly, Hafez Rouzati, Andy Wu, Jee Yeon ...
« Prev « First page 1945 / 2411 Last » Next »