Sciweavers

446 search results - page 7 / 90
» How was your day
Sort
View
GLOBECOM
2009
IEEE
14 years 2 months ago
The Directional Attack on Wireless Localization -or- How to Spoof Your Location with a Tin Can
—802.11 localization algorithms provide the ability to accurately position and track wireless clients thereby enabling location-based services and applications. However, we show ...
Kevin S. Bauer, Damon McCoy, Eric W. Anderson, Mar...
HVC
2007
Springer
108views Hardware» more  HVC 2007»
14 years 1 months ago
How Fast and Fat Is Your Probabilistic Model Checker? An Experimental Performance Comparison
Abstract. This paper studies the efficiency of several probabilistic model checkers by comparing verification times and peak memory usage for a set of standard case studies. The s...
David N. Jansen, Joost-Pieter Katoen, Marcel Olden...
HPDC
2006
IEEE
14 years 1 months ago
How should you structure your hierarchical scheduler?
Pushpinder-Kaur Chouhan, Holly Dail, Eddy Caron, F...