Sciweavers

897 search results - page 132 / 180
» Identity: How to name it, How to find it
Sort
View
MOBICOM
2010
ACM
15 years 1 months ago
Did you see Bob?: human localization using mobile phones
Finding a person in a public place, such as in a library, conference hotel, or shopping mall, can be difficult. The difficulty arises from not knowing where the person may be at t...
Ionut Constandache, Xuan Bao, Martin Azizyan, Romi...
WISEC
2010
ACM
15 years 1 months ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...
AI
2008
Springer
15 years 1 months ago
Robust artificial life via artificial programmed death
We propose a novel approach to self-regenerating continuously-operating systems. Such systems provide best-case solutions in security surveillance or decision making centers. We i...
M. M. Olsen, N. Siegelmann-Danieli, Hava T. Siegel...

Publication
116views
15 years 1 months ago
Poking Facebook: Characterization of OSN Applications
Facebook is one of the most popular Internet sites today. A key fea- ture that arguably contributed to Facebook's unprecedented success is its application platform, which enab...
Minas Gjoka, Michael Sirivianos, Athina Markopoulo...
IAJIT
2008
151views more  IAJIT 2008»
15 years 1 months ago
Analysis Of Epileptic Events Using Wavelet Packets
: Many studies have focused on the nonlinear analysis of electroencephalography mainly for the characterization of epileptic brain states. The spatial and temporal dynamics of the ...
Nisrine Sinno, Kifah Tout