Search

Search Funnelback University

Search powered by Funnelback
1 - 5 of 5 search results for Economics middle test |u:mobile-systems.cl.cam.ac.uk where 1 match all words and 4 match some words.
  1. Fully-matching results

  2. 39 WILDSENSING: Design and Deployment of a Sustainable SensorNetwork…

    https://mobile-systems.cl.cam.ac.uk/papers/tosn2011.pdf
    27 Apr 2011: These thorough tests were necessary to establish thebiological meaning of a transmission recorded by a detection node. ... Fig. 10. Results from the network test: (a) Distribution of node duty cycles for the centralized storageapproach.
  3. Results that match 2 of 3 words

  4. Track Globally, Deliver Locally: Improving Content DeliveryNetworks…

    https://mobile-systems.cl.cam.ac.uk/papers/www2011.pdf
    31 Jan 2011: 6. EVALUATIONIn order to test whether information extracted from ge-. ographic social cascades can effectively be exploited to im-prove the performance of CDNs we have investigated throughsimulation how different cache ... Social cascades have been
  5. SpotME If You Can: Randomized Responses forLocation Obfuscation on ...

    https://mobile-systems.cl.cam.ac.uk/papers/icdcs2011.pdf
    2 Mar 2011: To test theextent to which this assumption affects the estimation of thenumber of people, we compute the error in the estimationversus u for the three areas and for the subway traces. ... In The 8th Workshopon the Economics of Information Security (WEIS),
  6. SenShare: Transforming Sensor Networks IntoMulti-Application Sensing…

    https://mobile-systems.cl.cam.ac.uk/papers/ewsn2012.pdf
    20 Dec 2011: Presently, the deployment of sensing infrastructuresin buildings is treated as a tool for monitoring the environmental impact of abuilding’s life cycle and the economic impact of its maintenance [10]. ... Each test application was designed toproduce
  7. 978-1-4577-0351-5/11/$26.00 c©2011 IEEE Exploiting Temporal Complex…

    https://mobile-systems.cl.cam.ac.uk/papers/wowmom11full.pdf
    27 Apr 2011: For example, when secu-rity researchers downloaded Cabir [1] – a proof-of-conceptmobile worm – for analysis, they discovered the full risk asit broke loose, replicating from the test device to externalmobile ... phones. This prompted the need for

Refine your results

Search history

Recently clicked results

Recently clicked results

Your click history is empty.

Recent searches

Recent searches

Your search history is empty.