Sciweavers

2347 search results - page 222 / 470
» Location, location, location: a study of bluejacking practic...
Sort
View
OSDI
2006
ACM
14 years 8 months ago
Securing Software by Enforcing Data-flow Integrity
Software attacks often subvert the intended data-flow in a vulnerable program. For example, attackers exploit buffer overflows and format string vulnerabilities to write data to u...
Manuel Costa, Miguel Castro, Timothy L. Harris
ICASSP
2009
IEEE
14 years 3 months ago
Formant-based technique for automatic filled-pause detection in spontaneous spoken english
Detection of filled pauses is a challenging research problem which has several practical applications. It can be used to evaluate the spoken fluency skills of the speaker, to im...
Kartik Audhkhasi, Kundan Kandhway, Om Deshmukh, As...
ICC
2009
IEEE
130views Communications» more  ICC 2009»
14 years 3 months ago
Repeater-Assisted Capacity Enhancement (RACE) for MIMO Links in a Line-of-Sight Environment
— A single on-frequency, full duplex wireless repeater is considered for enhancing the capacity of a long-distance 2x2 multiple-input multiple-output (MIMO) wireless link with a ...
Brett T. Walkenhorst, Mary Ann Ingram
ISCC
2009
IEEE
139views Communications» more  ISCC 2009»
14 years 3 months ago
Location-dependent performance of cooperative networks with power allocation
—In this paper we investigate a cooperative mobile network with respect to error performance. Power allocation is applied between source and relay. The relay cooperates after hav...
Tobias Renk, Friedrich Jondral
MDM
2009
Springer
102views Communications» more  MDM 2009»
14 years 2 months ago
Privacy-Aware Proximity Based Services
Proximity based services are location based services (LBS) in which the service adaptation depends on the comparison between a given threshold value and the distance between a use...
Sergio Mascetti, Claudio Bettini, Dario Freni, Xia...