Cooperation in wireless networks with selfish users
PDF
USC Computer Science Technical Reports, no. 858 (2005)
PDF
Killer apps and sick users: technology, disease, and differential analysis
PDF
Satisfying QoS requirements through user-system interaction analysis
PDF
Design, modeling, and analysis for cache-aided wireless device-to-device communications
PDF
The two faces of digital diplomacy: dialogic public diplomacy and space for user motives
PDF
Scalable reputation systems for peer-to-peer networks
PDF
Personalized Pareto-improving pricing-and-routing schemes with preference learning for optimum freight routing
PDF
Advertising and consumption in post-Mao China: between the local and the global
PDF
USC Computer Science Technical Reports, no. 764 (2002)
PDF
thesis.dvi
PDF
Low-state mechanisms to protect the network from greedy and malicious agents
PDF
Not being bad is not good enough: why companies need to be proactively doing good through CSR initiatives
PDF
Localite
PDF
Media access control for optical CDMA networks through interference avoidance
PDF
Brazos Abiertos: addressing mental health stigma among the Latino Catholic community
PDF
The implementation of countertop computing: User training at the United States Postal Service
PDF
From the extraordinary to the everyday: fan culture’s impact on the transition of Chinese post-cinema in the first twenty years of the twenty-first century
PDF
SMART:  A small world-based reputation system for MANETs
PDF
Demand response management in smart grid from distributed optimization perspective
PDF
The theme of the pastorale and the Russian Silver Age
PDF
Scheduling and resource allocation with incomplete information in wireless networks
PDF
Bounded technological rationality: the intersection between artificial intelligence, cognition, and environment and its effects on decision-making
PDF
Improving network security through cyber-insurance
PDF
Walls.
PDF
of 87 
 For more images, please select "images" in the filters.
1 - 50 of 4328
of 87 
Standard Filters