Sciweavers

2139 search results - page 224 / 428
» Distributed computing and computer security education
Sort
View
112
Voted
MOBISYS
2009
ACM
16 years 4 months ago
Attacks on public WLAN-based positioning systems
In this work, we study the security of public WLAN-based positioning systems. Specifically, we investigate the Skyhook positioning system, available on PCs and used on a number of...
Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Chri...
117
Voted
CCR
2010
152views more  CCR 2010»
15 years 28 days ago
CYBEX: the cybersecurity information exchange framework (x.1500)
The cybersecurity information exchange framework, known as CYBEX, is currently undergoing its first iteration of standardization efforts within ITU-T. The framework describes how ...
Anthony M. Rutkowski, Youki Kadobayashi, Inette Fu...
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
15 years 10 months ago
Privacy Preserving Decision Tree Mining from Perturbed Data
Privacy preserving data mining has been investigated extensively. The previous works mainly fall into two categories, perturbation and randomization based approaches and secure mu...
Li Liu, Murat Kantarcioglu, Bhavani M. Thuraisingh...
141
Voted
CCGRID
2005
IEEE
15 years 9 months ago
Enabling technologies for future learning scenarios: the semantic grid for human learning
In this paper, starting from the limitations and constrains of traditional human learning approaches, we outline new suitable approaches to education and training in future knowle...
Angelo Gaeta, Pierluigi Ritrovato, Francesco Orciu...
101
Voted
CORR
2010
Springer
123views Education» more  CORR 2010»
15 years 3 months ago
Mutual Information of IID Complex Gaussian Signals on Block Rayleigh-faded Channels
We present a method to compute, quickly and efficiently, the mutual information achieved by an IID (independent identically distributed) complex Gaussian input on a block Rayleigh-...
Fredrik Rusek, Angel Lozano, Nihar Jindal