Sciweavers

66 search results - page 13 / 14
» Secure Location Verification Using Radio Broadcast
Sort
View
WASA
2009
Springer
107views Algorithms» more  WASA 2009»
13 years 12 months ago
Relative Span Weighted Localization of Uncooperative Nodes in Wireless Networks
Abstract. Increasingly ubiquitous wireless technologies require novel localization techniques to pinpoint the position of an uncooperative node, whether the target be a malicious d...
Christine Laurendeau, Michel Barbeau
JASSS
2002
94views more  JASSS 2002»
13 years 4 months ago
The power of commitment in cooperative social action
This project presents an agent-based simulation model of protest activity. Agents are located in a two dimensional grid and have limited ability to observe the behavior of other a...
David Brichoux, Paul E. Johnson
ICC
2007
IEEE
214views Communications» more  ICC 2007»
13 years 11 months ago
Distributed ONS and its Impact on Privacy
— The EPC Network is an industry proposal to build a global information architecture for objects carrying RFID tags with Electronic Product Codes (EPC). A so-called Object Naming...
Benjamin Fabian, Oliver Günther
SIGSOFT
2004
ACM
14 years 6 months ago
PSE: explaining program failures via postmortem static analysis
In this paper, we describe PSE (Postmortem Symbolic Evaluation), a static analysis algorithm that can be used by programmers to diagnose software failures. The algorithm requires ...
Roman Manevich, Manu Sridharan, Stephen Adams, Man...
WSC
1998
13 years 6 months ago
Avoiding the Blues for Airline Travelers
The fast growth in airline passenger traffic combined with the slow growth in airport capacity worldwide is putting a severe strain on the capability of airlines to adapt their pr...
Jane L. Snowdon, Soad El-Taji, Mario Montevecchi, ...