Sciweavers

ALGOSENSORS
2015
Springer
9 years 11 months ago
Limitations of Current Wireless Scheduling Algorithms
We consider the problem of scheduling wireless links in the physical model, where we seek a partition of a given a set of wireless links into the minimum number of subsets satisfyi...
Magnús M. Halldórsson, Christian Kon...
ALGOSENSORS
2015
Springer
9 years 11 months ago
A Comprehensive and Lightweight Security Architecture to Secure the IoT Throughout the Lifecycle of a Device Based on HIMMO
Smart objects are devices with computational and communication capabilities connected to the Internet forming the so called Internet of Things (IoT). The IoT enables many applicati...
Oscar García Morchon, Ronald Rietman, Sahil...
ALGOSENSORS
2015
Springer
9 years 11 months ago
Plane and Planarity Thresholds for Random Geometric Graphs
A random geometric graph, G(n, r), is formed by choosing n points independently and uniformly at random in a unit square; two points are connected by a straight-line edge if they a...
Ahmad Biniaz, Evangelos Kranakis, Anil Maheshwari,...
ALGOSENSORS
2015
Springer
9 years 11 months ago
Radio Aggregation Scheduling
We consider the aggregation problem in radio networks: nd a spanning tree in a given graph and a conict-free schedule of the edges so as to minimize the latency of the computatio...
Rajiv Gandhi, Magnús M. Halldórsson,...
NSPW
2015
ACM
9 years 11 months ago
WebSheets: Web Applications for Non-Programmers
Spreadsheets are a very successful programming paradigm. Their success stems from user’s familiarity with tabular data, and their previous experience in performing manual comput...
Riccardo Pelizzi, R. Sekar
NSPW
2015
ACM
9 years 11 months ago
Exploiting the Physical Environment for Securing the Internet of Things
Using the randomness provided by the physical environment to build security solutions has received much attention recently. In particular, the shared entropy provided by measuring...
Christian T. Zenger, Jan Zimmer, Mario Pietersz, J...
NSPW
2015
ACM
9 years 11 months ago
The Myth of the Average User: Improving Privacy and Security Systems through Individualization
While individual differences in decision-making have been examined within the social sciences for several decades, they have only recently begun to be applied by computer scienti...
Serge Egelman, Eyal Péer
NPAR
2015
ACM
9 years 11 months ago
Semi-automatic digital epigraphy from images with normals
We present a semi-automated system for converting photometric datasets (RGB images with normals) into geometry-aware non-photorealistic illustrations that obey the common conventi...
Sema Berkiten, Xinyi Fan, Szymon Rusinkiewicz
139
Voted
NOSSDAV
2015
Springer
9 years 11 months ago
Content-adaptive display power saving in internet mobile streaming
Yao Liu, Mengbai Xiao, Ming Zhang, Xin Li, Mian Do...
89
Voted
NOSSDAV
2015
Springer
9 years 11 months ago
Last N: relevance-based selectivity for forwarding video in multimedia conferences
Multiparty conferencing has traditionally been a relatively expensive application that was only used in enterprise scenarios. Recently, however, the landscape has started to shift...
Boris Grozev, Lyubomir Marinov, Varun Singh, Emil ...