Sciweavers

29 search results - page 3 / 6
» On the Anonymity of Periodic Location Samples
Sort
View
LISA
2000
13 years 8 months ago
Tracing Anonymous Packets to Their Approximate Source
Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program ...
Hal Burch, Bill Cheswick
COMCOM
2008
102views more  COMCOM 2008»
13 years 7 months ago
Bluebot: Asset tracking via robotic location crawling
From manufacturers, distributors, and retailers of consumer goods to government departments, enterprises of all kinds are gearing up to use RFID technology to increase the visibil...
Abhishek Patil, Jonathan Munson, David Wood, Alan ...
LOCA
2009
Springer
14 years 1 months ago
Improving Location Fingerprinting through Motion Detection and Asynchronous Interval Labeling
Abstract. Wireless signal strength fingerprinting has become an increasingly popular technique for realizing indoor localization systems using existing WiFi infrastructures. Howev...
Philipp Bolliger, Kurt Partridge, Maurice Chu, Mar...
ICPR
2008
IEEE
14 years 1 months ago
A method for removing cyclic artefacts in discrete tomography using latin squares
This paper presents a technique to remove image artefacts, formed under the cyclic additive group Zp, during the inverse Radon reconstruction from primedimensioned discrete projec...
Shekhar Chandra, Imants D. Svalbe
MOBIHOC
2008
ACM
14 years 6 months ago
Efficient binary schemes for training heterogeneous sensor and actor networks
Sensor networks are expected to evolve into long-lived, autonomous networked systems whose main mission is to provide in-situ users ? called actors ? with real-time information in...
Ferruccio Barsi, Alfredo Navarra, Maria Cristina P...