Not only the communication capabilities of 802.11, but also the capability to determine the position of mobile devices make 802.11 highly appealing for many application areas. Typ...
Thomas King, Thomas Haenselmann, Stephan Kopf, Wol...
We present APHRODITE, an architecture designed to reduce false positives in network intrusion-detection systems. APHRODITE works by detecting anomalies in the outgoing traffic, an...
The efficient delivery of internet content has been identified as a key issue of research for some time. Forward (or reverse) proxies, which are positioned along the request route...
Networked virtual environments are increasingly used for collaboration tasks and other interactive applications. While the graphics in such virtual worlds are usually three-dimens...
Beomjoo Seo, Roger Zimmermann, Min Min Htoon, Chun...
— In this paper, we introduce a new approach to location estimation where, instead of locating a single client, we simultaneously locate a set of wireless clients. We present a B...
David Madigan, E. Einahrawy, R. P. Martin, Wen-Hua...