Sciweavers

3486 search results - page 692 / 698
» System Design and Networking Protocols for Wireless Position...
Sort
View
131
Voted
MOBICOM
2009
ACM
15 years 9 months ago
SurroundSense: mobile phone localization via ambience fingerprinting
A growing number of mobile computing applications are centered around the user’s location. The notion of location is broad, ranging from physical coordinates (latitude/longitude...
Martin Azizyan, Ionut Constandache, Romit Roy Chou...
117
Voted
ACSAC
2010
IEEE
15 years 24 days ago
Comprehensive shellcode detection using runtime heuristics
A promising method for the detection of previously unknown code injection attacks is the identification of the shellcode that is part of the attack vector using payload execution....
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
138
Voted
GI
2008
Springer
15 years 3 months ago
A Novel Conceptual Model for Accessing Distributed Data and Applications, as well as Devices
: As data and services are increasingly distributed in the network, rather than stored in a fixed location, one can imagine a scenario in which the Personal Computer, intended as a...
Lucia Terrenghi, Thomas Lang
142
Voted
BMCBI
2006
114views more  BMCBI 2006»
15 years 2 months ago
Epigenetic acquisition of inducibility of type III cytotoxicity in P. aeruginosa
Background: Pseudomonas aeruginosa, an opportunistic pathogen, is often encountered in chronic lung diseases such as cystic fibrosis or chronic obstructive pneumonia, as well as a...
Didier Filopon, Annabelle Mérieau, Gilles B...
127
Voted
ATAL
2004
Springer
15 years 8 months ago
Adaptive Information Infrastructures for the e-Society
Abstract. Positioned at the confluence between human/machine and hardware/software integration and backed by a solid proof of concept realized through several scenarios encompassin...
Mihaela Ulieru