Sciweavers

2347 search results - page 456 / 470
» Location, location, location: a study of bluejacking practic...
Sort
View
CCS
2009
ACM
14 years 2 months ago
As-awareness in Tor path selection
Tor is an anonymous communications network with thousands of router nodes worldwide. An intuition reflected in much of the literature on anonymous communications is that, as an a...
Matthew Edman, Paul F. Syverson
IPSN
2009
Springer
14 years 2 months ago
Recovering temporal integrity with Data Driven Time Synchronization
Data Driven Time Synchronization (DDTS) provides synchronization across sensors by using underlying characteristics of data collected by an embedded sensing system. We apply the c...
Martin Lukac, Paul Davis, Robert Clayton, Deborah ...
GLOBECOM
2009
IEEE
14 years 2 months ago
Distributed Target Tracking with Directional Binary Sensor Networks
—One of the most common and important applications of wireless sensor networks is target tracking. We study it in its most basic form, assuming the binary sensing model in which ...
Zijian Wang, Eyuphan Bulut, Boleslaw K. Szymanski
ICTAI
2009
IEEE
14 years 2 months ago
Preventing Unwanted Social Inferences with Classification Tree Analysis
A serious threat to user privacy in new mobile and web2.0 applications stems from ‘social inferences’. These unwanted inferences are related to the users’ identity, current ...
Sara Motahari, Sotirios G. Ziavras, Quentin Jones
INFOCOM
2009
IEEE
14 years 2 months ago
Noncooperative Load Balancing in the Continuum Limit of a Dense Network
Abstract—In transportation network research, the main approach for predicting traffic distribution due to noncooperative vehicle choices has been through fluid type models. The...
Eitan Altman, Ishai Menache, Asuman E. Ozdaglar