Sciweavers

2363 search results - page 405 / 473
» How Secure is RFID
Sort
View
CSE
2009
IEEE
15 years 11 months ago
Ambulation: A Tool for Monitoring Mobility Patterns over Time Using Mobile Phones
An important tool for evaluating the health of patients who suffer from mobility-affecting chronic diseases such as MS, Parkinson’s, and Muscular Dystrophy is assessment of how ...
Jason Ryder, Brent Longstaff, Sasank Reddy, Debora...
ICASSP
2009
IEEE
15 years 11 months ago
Time-sensitive behavior dynamics in multimedia fingerprinting social networks
Multimedia social network is a network infrastructure in which the social network members share multimedia contents with all different purposes. Analyzing user behavior in multime...
W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
ICC
2009
IEEE
134views Communications» more  ICC 2009»
15 years 11 months ago
Short-Length Raptor Codes for Mobile Free-Space Optical Channels
Abstract—Free-space optical (FSO) links are competitive wireless links offering high data rate, security and low system complexity. For mobile applications, e.g., from a ground b...
Wenzhe Zhang, Steve Hranilovic
ICC
2009
IEEE
100views Communications» more  ICC 2009»
15 years 11 months ago
Pollution Resilience for DNS Resolvers
Abstract—The DNS is a cornerstone of the Internet. Unfortunately, no matter how securely an organization provisions and guards its own DNS infrastructure, it is at the mercy of o...
Andrew J. Kalafut, Minaxi Gupta
P2P
2009
IEEE
15 years 11 months ago
On Tracking Freeriders in Gossip Protocols
Peer-to-peer content dissemination applications suffer immensely from freeriders, i.e., nodes that do not provide their fair share. The Tit-for-Tat (TfT) incentives have received ...
Rachid Guerraoui, Kévin Huguenin, Anne-Mari...