Sciweavers

1737 search results - page 287 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
SAC
2011
ACM
14 years 5 months ago
Tracking continuous topological changes of complex moving regions
A moving region whose location and extend change over time can imply topological changes such as region split and hole formation. To study this phenomenon is useful in many applic...
Hechen Liu, Markus Schneider
MOBISYS
2007
ACM
16 years 1 months ago
Preserving location privacy in wireless lans
The broadcast and tetherless nature of wireless networks and the widespread deployment of Wi-Fi hotspots makes it easy to remotely locate a user by observing her wireless signals....
Tao Jiang, Helen J. Wang, Yih-Chun Hu
GIS
2007
ACM
16 years 3 months ago
Multilevel object-oriented classification of quickbird images for urban population estimates
This paper is committed to explore object-oriented methods for the classification of Quickbird images, aiming to support future urban population estimates. The study area concerns...
Carolina M. D. Pinho, Cláudia Maria de Alme...
SIGMOD
2006
ACM
171views Database» more  SIGMOD 2006»
16 years 2 months ago
Communication-efficient distributed monitoring of thresholded counts
Monitoring is an issue of primary concern in current and next generation networked systems. For example, the objective of sensor networks is to monitor their surroundings for a va...
Ram Keralapura, Graham Cormode, Jeyashankher Ramam...
INFOCOM
2008
IEEE
15 years 8 months ago
A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks
—We develop a practical and comprehensive hybrid rogue access point (AP) detection framework for commodity WiFi networks. It is the first scheme that combines the distributed wi...
Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng