Sciweavers

1373 search results - page 90 / 275
» Secure multi-mode systems and their applications for pervasi...
Sort
View
WS
2004
ACM
14 years 2 months ago
A framework for wireless LAN monitoring and its applications
Many studies on measurement and characterization of wireless LANs (WLANs) have been performed recently. Most of these measurements have been conducted from the wired portion of th...
Jihwang Yeo, Moustafa Youssef, Ashok K. Agrawala
JUCS
2010
159views more  JUCS 2010»
13 years 3 months ago
Developing a Secure Mobile Grid System through a UML Extension
: The idea of developing software through systematic development processes to improve software quality is not new. Nevertheless, there are still many information systems such as th...
David G. Rosado, Eduardo Fernández-Medina, ...
COMSWARE
2007
IEEE
14 years 3 months ago
Competition between SOM Clusters to Model User Authentication System in Computer Networks
—Traditional authentication systems employed on Internet are facing an acute problem of intrusions. In this context we propose a neural architecture for user authentication throu...
Shrijit S. Joshi, Vir V. Phoha
LOCA
2007
Springer
14 years 2 months ago
A Taxonomy for Radio Location Fingerprinting
Abstract. Location Fingerprinting (LF) is a promising location technique for many awareness applications in pervasive computing. However, as research on LF systems goes beyond basi...
Mikkel Baun Kjærgaard
CCS
2011
ACM
12 years 8 months ago
Televisions, video privacy, and powerline electromagnetic interference
We conduct an extensive study of information leakage over the powerline infrastructure from eight televisions (TVs) spanning multiple makes, models, and underlying technologies. I...
Miro Enev, Sidhant Gupta, Tadayoshi Kohno, Shwetak...