Sciweavers

785 search results - page 21 / 157
» Two remarks on remotality
Sort
View
NETWORKING
2007
13 years 11 months ago
Detecting 802.11 Wireless Hosts from Remote Passive Observations
Abstract. The wide deployment of 802.11 WLANs has led to the coexistence of wired and wireless clients in a network environment. This paper presents a robust technique to detect 80...
Valeria Baiamonte, Konstantina Papagiannaki, Gianl...
SCANGIS
2003
13 years 11 months ago
Remote Sensing as a Tool in the Aquatic Macrophyte Mapping of a Eutrophic Lake: a Comparison Between Visual and Digital Classifi
In this study two aerial photograph interpretation methods, visual and digital classification, were used for the aquatic macrophyte mapping of a eutrophic study lake in the Finnish...
Kirsi Valta-Hulkkonen, Sari Partanen, Antti Kannin...
FC
2010
Springer
150views Cryptology» more  FC 2010»
13 years 11 months ago
A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets
Abstract. It is becoming more common for researchers to find themselves in a position of being able to take over control of a malicious botnet. If this happens, should they use thi...
David Dittrich, Felix Leder, Tillmann Werner
NAR
2007
152views more  NAR 2007»
13 years 9 months ago
COMPASS server for remote homology inference
COMPASS is a method for homology detection and local alignment construction based on the comparison of multiple sequence alignments (MSAs). The method derives numerical profiles f...
Ruslan Sadreyev, Ming Tang, Bong-Hyun Kim, Nick V....
ESORICS
2011
Springer
12 years 9 months ago
Remote Timing Attacks Are Still Practical
For over two decades, timing attacks have been an active area of research within applied cryptography. These attacks exploit cryptosystem or protocol implementations that do not ru...
Billy Bob Brumley, Nicola Tuveri