Sciweavers

1597 search results - page 231 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
BPSC
2009
190views Business» more  BPSC 2009»
13 years 10 months ago
Detective Information Flow Analysis for Business Processes
Abstract: We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling ...
Rafael Accorsi, Claus Wonnemann
IROS
2006
IEEE
190views Robotics» more  IROS 2006»
14 years 3 months ago
SwisTrack: A Tracking Tool for Multi-Unit Robotic and Biological Systems
— Tracking of miniature robotic platforms involves major challenges in image recognition and data association. We present our 3-year effort into developing the platform-independe...
Nikolaus Correll, Grégory Sempo, Yuri L&oac...
TWC
2008
201views more  TWC 2008»
13 years 9 months ago
A Novel Algorithm for Multipath Fingerprinting in Indoor WLAN Environments
Abstract--Positioning in indoor wireless environments is growing rapidly in importance and gains commercial interests in context-awareness applications. The essential challenge in ...
Shih-Hau Fang, Tsung-Nan Lin, Kun-Chou Lee
COMCOM
2008
91views more  COMCOM 2008»
13 years 9 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
PVLDB
2010
139views more  PVLDB 2010»
13 years 7 months ago
Aether: A Scalable Approach to Logging
The shift to multi-core hardware brings new challenges to database systems, as the software parallelism determines performance. Even though database systems traditionally accommod...
Ryan Johnson, Ippokratis Pandis, Radu Stoica, Mano...