Sciweavers

2334 search results - page 286 / 467
» Architecture of the Entropia Distributed Computing System
Sort
View
MOBISYS
2009
ACM
16 years 5 months ago
Attacks on public WLAN-based positioning systems
In this work, we study the security of public WLAN-based positioning systems. Specifically, we investigate the Skyhook positioning system, available on PCs and used on a number of...
Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Chri...
156
Voted
WISEC
2010
ACM
15 years 5 months ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...
ICCS
2004
Springer
15 years 10 months ago
A Real-Time Total Order Multicast Protocol
Abstract. We describe, analyze and submit results of a real-time total order multicast protocol developed on a distributed real-time system architecture that consists of hierarchic...
Kayhan Erciyes, Ahmet Sahan
ICMCS
2006
IEEE
108views Multimedia» more  ICMCS 2006»
15 years 11 months ago
Efficient Speaker Detection via Target Dependent Data Reduction
Systems designed to extract time-critical information from large volumes of unstructured data must include the ability, both from an architectural and algorithmic point of view, t...
Upendra V. Chaudhari, Olivier Verscheure, Juan Hue...
EDOC
2005
IEEE
15 years 10 months ago
FTWeb: A Fault Tolerant Infrastructure for Web Services
The web services architecture came as answers to the search for interoperability among applications. In recent years there has been a growing interest in deploying on the Internet...
Giuliana Teixeira Santos, Lau Cheuk Lung, Carlos M...