Sciweavers

182 search results - page 21 / 37
» Identity the Civic Scenario
Sort
View
SP
2009
IEEE
14 years 5 months ago
The Mastermind Attack on Genomic Data
In this paper, we study the degree to which a genomic string, Q, leaks details about itself any time it engages in comparison protocols with a genomic querier, Bob, even if those ...
Michael T. Goodrich
ICNP
2007
IEEE
14 years 4 months ago
Slotted Scheduled Tag Access in Multi-Reader RFID Systems
Abstract—Radio frequency identification (RFID) is a technology where a reader device can “sense” the presence of a closeby object by reading a tag device attached to the obj...
Zongheng Zhou, Himanshu Gupta, Samir R. Das, Xianj...
WS
2006
ACM
14 years 4 months ago
Location privacy in wireless personal area networks
Location privacy is one of the major security problems in a Wireless Personal Area Network (WPAN). By eavesdropping on the transmitted packets, an attacker can keep track of the p...
Dave Singelée, Bart Preneel
SSPR
2004
Springer
14 years 3 months ago
Clustering Variable Length Sequences by Eigenvector Decomposition Using HMM
We present a novel clustering method using HMM parameter space and eigenvector decomposition. Unlike the existing methods, our algorithm can cluster both constant and variable leng...
Fatih Murat Porikli
CIIT
2007
195views Communications» more  CIIT 2007»
13 years 12 months ago
Using a cache scheme to detect selfish nodes in mobile ad hoc networks
This paper presents a hardware based cache scheme to detect selfish nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upperlayer software...
H. Lin, José G. Delgado-Frias, Sirisha Medi...