Sciweavers

57 search results - page 9 / 12
» iv 2002
Sort
View
NDSS
2002
IEEE
13 years 11 months ago
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP
We implemented an attack against WEP, the link-layer security protocol for 802.11 networks. The attack was described in a recent paper by Fluhrer, Mantin, and Shamir. With our imp...
Adam Stubblefield, John Ioannidis, Aviel D. Rubin
SOFTWARE
2002
13 years 6 months ago
Handling Uncertainty in a Medical Study of Dietary Intake During Pregnancy
This paper is concerned with handling uncertainty as part of the analysis of data from a medical study. The study is investigating connections between the birth weight of babies an...
Adele H. Marshall, David A. Bell, Roy Sterritt
JECR
2002
129views more  JECR 2002»
13 years 6 months ago
The Self-Confrontation Interview: Towards an Enhanced Understanding of Human Factors in Web-based Interaction for Improved Websi
An in-depth understanding of human factors in web-based interaction requires a methodology which enables researchers to chart online actions, understand the cognitive processes gu...
Sun Lim
ICPR
2002
IEEE
14 years 7 months ago
Integrated Approach of Multiple Face Detection for Video Surveillance
For applications such as video surveillance and human computer interface, we propose an efficiently integrated method to detect and track faces. Various visual cues are combined t...
Tae-Kyun Kim, Sung-Uk Lee, Jong Ha Lee, Seok-Cheol...
ICRA
2002
IEEE
108views Robotics» more  ICRA 2002»
13 years 11 months ago
Towards Sensor Based Coverage with Robot Teams
We introduce a new algorithm to cover an unknown space with a homogeneous team of circular mobile robots. Our approach is based on a single robot coverage algorithm, a boustrophed...
DeWitt Latimer IV, Siddhartha S. Srinivasa, Vincen...