Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program ...
From manufacturers, distributors, and retailers of consumer goods to government departments, enterprises of all kinds are gearing up to use RFID technology to increase the visibil...
Abhishek Patil, Jonathan Munson, David Wood, Alan ...
Abstract. Wireless signal strength fingerprinting has become an increasingly popular technique for realizing indoor localization systems using existing WiFi infrastructures. Howev...
Philipp Bolliger, Kurt Partridge, Maurice Chu, Mar...
This paper presents a technique to remove image artefacts, formed under the cyclic additive group Zp, during the inverse Radon reconstruction from primedimensioned discrete projec...
Sensor networks are expected to evolve into long-lived, autonomous networked systems whose main mission is to provide in-situ users ? called actors ? with real-time information in...
Ferruccio Barsi, Alfredo Navarra, Maria Cristina P...