Sciweavers

2347 search results - page 388 / 470
» Location, location, location: a study of bluejacking practic...
Sort
View
ICASSP
2009
IEEE
14 years 2 months ago
The speed of greed: Characterizing myopic gossip through network voracity
This paper analyzes the rate of convergence of greedy gossip with eavesdropping (GGE). In previous work, we proposed GGE, a fast gossip algorithm based on exploiting the broadcast...
Deniz Üstebay, Boris N. Oreshkin, Mark Coates...
ICRA
2009
IEEE
185views Robotics» more  ICRA 2009»
14 years 2 months ago
Ad-hoc wireless network coverage with networked robots that cannot localize
— We study a fully distributed, reactive algorithm for deployment and maintenance of a mobile communication backbone that provides an area around a network gateway with wireless ...
Nikolaus Correll, Jonathan Bachrach, Daniel Vicker...
ICRA
2009
IEEE
197views Robotics» more  ICRA 2009»
14 years 2 months ago
Synchronous EEG brain-actuated wheelchair with automated navigation
Abstract— This paper describes a new non-invasive brainactuated wheelchair that relies on a P300 neurophysiological protocol and automated navigation. In operation, the subject f...
Iñaki Iturrate, Javier M. Antelis, Javier M...
FC
2009
Springer
106views Cryptology» more  FC 2009»
14 years 2 months ago
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing
Attackers compromise web servers in order to host fraudulent content, such as malware and phishing websites. While the techniques used to compromise websites are widely discussed a...
Tyler Moore, Richard Clayton
IWMM
2009
Springer
130views Hardware» more  IWMM 2009»
14 years 2 months ago
A component model of spatial locality
Good spatial locality alleviates both the latency and bandwidth problem of memory by boosting the effect of prefetching and improving the utilization of cache. However, convention...
Xiaoming Gu, Ian Christopher, Tongxin Bai, Chengli...