Sciweavers

99 search results - page 19 / 20
» Personal Position Measurement Using Dead Reckoning
Sort
View
IMC
2006
ACM
13 years 12 months ago
A study of malware in peer-to-peer networks
Peer-to-peer (P2P) networks continue to be popular means of trading content. However, very little protection is in place to make sure that the files exchanged in these networks a...
Andrew J. Kalafut, Abhinav Acharya, Minaxi Gupta
MOBIWAC
2006
ACM
13 years 12 months ago
Calibration-free WLAN location system based on dynamic mapping of signal strength
In this work we present a calibration-free system for locating wireless local area network devices, based on the radio frequency characteristics of such networks. Calibration proc...
Luís Felipe M. de Moraes, Bruno Astuto A. N...
IMC
2006
ACM
13 years 12 months ago
Approximate fingerprinting to accelerate pattern matching
Pattern matching and analysis over network data streams is increasingly becoming an essential primitive of network monitoring systems. It is a fundamental part of most intrusion d...
Ramaswamy Ramaswamy, Lukas Kencl, Gianluca Iannacc...
IMDS
2007
80views more  IMDS 2007»
13 years 5 months ago
Effect of team diversity on software project performance
Purpose – This research seeks to investigate the relationship between knowledge diversity (KD) in software teams and project performance. Previous research has shown that member...
Ting-Peng Liang, Chih-Chung Liu, Tse-Min Lin, Bins...
ICCV
2009
IEEE
14 years 11 months ago
Is that you? Metric Learning Approaches for Face Identification
Face identification is the problem of determining whether two face images depict the same person or not. This is difficult due to variations in scale, pose, lighting, background...
Matthieu Guillaumin, Jakob Verbeek, Cordelia Schmi...