Exploiting packets’ timing information for covert communication in the Internet has been explored by several network timing channels and watermarking schemes. Several of them em...
— Service robots designed for domestic settings need to navigate in an environment that they have to share with their users. Thus, they have to be able to report their current st...
Abstract. When installing network intrusion detection systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between dete...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
For the analysis of learning processes and the underlying changes of the shape of excitatory synapses (spines), 3-D volume samples of selected dendritic segments are scanned by a ...
Andreas Herzog, Bernd Michaelis, Gerald Krell, Kat...
Abstract. Wireless signal strength fingerprinting has become an increasingly popular technique for realizing indoor localization systems using existing WiFi infrastructures. Howev...
Philipp Bolliger, Kurt Partridge, Maurice Chu, Mar...