Sciweavers

SIGCOMM
2012
ACM
12 years 2 months ago
Towards detecting BGP route hijacking using the RPKI
Prefix hijacking has always been a big concern in the Internet. Some events made it into the international world-news, but most of them remain unreported or even unnoticed. The s...
Matthias Wählisch, Olaf Maennel, Thomas C. Sc...
SIGCOMM
2012
ACM
12 years 2 months ago
First insights from a mobile honeypot
Computer systems are commonly attacked by malicious transport contacts. We present a comparative study that analyzes to what extent those attacks depend on the network access, in ...
Matthias Wählisch, Sebastian Trapp, Christian...
WMCSA
2012
IEEE
12 years 7 months ago
SpinLoc: spin once to know your location
The rapid growth of location-based applications has spurred extensive research on localization. Nonetheless, indoor localization remains an elusive problem mostly because the accu...
Souvik Sen, Romit Roy Choudhury, Srihari Nelakudit...
WMCSA
2012
IEEE
12 years 7 months ago
Code in the air: simplifying sensing and coordination tasks on smartphones
A growing class of smartphone applications are tasking applications that run continuously, process data from sensors to determine the user’s context (such as location) and activ...
Lenin Ravindranath, Arvind Thiagarajan, Hari Balak...
WMCSA
2012
IEEE
12 years 7 months ago
An amulet for trustworthy wearable mHealth
Mobile technology has significant potential to help revolutionize personal wellness and the delivery of healthcare. Mobile phones, wearable sensors, and home-based tele-medicine ...
Jacob Sorber, Minho Shin, Ronald A. Peterson, Cory...
WMCSA
2012
IEEE
12 years 7 months ago
ACCessory: password inference using accelerometers on smartphones
We show that accelerometer readings are a powerful side channel that can be used to extract entire sequences of entered text on a smartphone touchscreen keyboard. This possibility...
Emmanuel Owusu, Jun Han, Sauvik Das, Adrian Perrig...
MMB
2012
Springer
259views Communications» more  MMB 2012»
12 years 7 months ago
Boosting Design Space Explorations with Existing or Automatically Learned Knowledge
Abstract. During development, processor architectures can be tuned and configured by many different parameters. For benchmarking, automatic design space explorations (DSEs) with h...
Ralf Jahr, Horia Calborean, Lucian Vintan, Theo Un...
MMB
2012
Springer
240views Communications» more  MMB 2012»
12 years 7 months ago
A Demand-Response Calculus with Perfect Batteries
We consider an electricity consumer equipped with a perfect battery, who needs to satisfy a non-elastic load, subject to external control signals. The control imposes a time-varyin...
Jean-Yves Le Boudec, Dan-Cristian Tomozei
ICOIN
2012
Springer
12 years 7 months ago
Coordinated TCP Westwood congestion control for multiple paths over wireless networks
— Multipath TCP (MPTCP) has just been approved by the IETF. It was designed to be fairly shared with regular TCP, so its performance is equivalent that of a regular TCP flow tha...
Tuan Anh Le, Choong Seon Hong, Eui-nam Huh