Sciweavers

1972 search results - page 269 / 395
» Testing Mobile and Distributed Systems: Method and Experimen...
Sort
View
ICDCS
2005
IEEE
15 years 10 months ago
Enhancing Source-Location Privacy in Sensor Network Routing
— One of the most notable challenges threatening the successful deployment of sensor systems is privacy. Although many privacy-related issues can be addressed by security mechani...
Pandurang Kamat, Yanyong Zhang, Wade Trappe, Celal...
MOBICOM
2006
ACM
15 years 10 months ago
Robust rate adaptation for 802.11 wireless networks
Rate adaptation is a mechanism unspecified by the 802.11 standards, yet critical to the system performance by exploiting the multi-rate capability at the physical layer. In this ...
Starsky H. Y. Wong, Songwu Lu, Hao Yang, Vaduvur B...
CVIU
2007
174views more  CVIU 2007»
15 years 4 months ago
Laser-based detection and tracking of multiple people in crowds
Laser-based people tracking systems have been developed for mobile robotic, and intelligent surveillance areas. Existing systems rely on laser point clustering method to extract o...
Jinshi Cui, Hongbin Zha, Huijing Zhao, Ryosuke Shi...
KDD
2008
ACM
195views Data Mining» more  KDD 2008»
16 years 4 months ago
Anomaly pattern detection in categorical datasets
We propose a new method for detecting patterns of anomalies in categorical datasets. We assume that anomalies are generated by some underlying process which affects only a particu...
Kaustav Das, Jeff G. Schneider, Daniel B. Neill
COLCOM
2007
IEEE
15 years 8 months ago
A structure preserving approach for securing XML documents
With the widespread adoption of XML as the message format to disseminate content over distributed systems including Web Services and Publish-Subscribe systems, different methods ha...
Mohamed Nabeel, Elisa Bertino