Sciweavers

2347 search results - page 160 / 470
» Location, location, location: a study of bluejacking practic...
Sort
View
88
Voted
TON
2010
197views more  TON 2010»
14 years 8 months ago
Constrained relay node placement in wireless sensor networks: formulation and approximations
—One approach to prolong the lifetime of a wireless sensor network (WSN) is to deploy some relay nodes to communicate with the sensor nodes, other relay nodes, and the base stati...
Satyajayant Misra, Seung Don Hong, Guoliang Xue, J...
HICSS
2006
IEEE
99views Biometrics» more  HICSS 2006»
15 years 4 months ago
A Framework for Automatic Online Personalization
Inexpensive data collection and storage technologies and a global thirst for information have led to data repositories so large that users may become disoriented and unable to loc...
Paul Ralph, Jeff Parsons
ICSE
2007
IEEE-ACM
15 years 10 months ago
Tracking Code Clones in Evolving Software
Code clones are generally considered harmful in software development, and the predominant approach is to try to eliminate them through refactoring. However, recent research has pr...
Ekwa Duala-Ekoko, Martin P. Robillard
DCC
2005
IEEE
15 years 9 months ago
Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults
Elliptic curve cryptosystems in the presence of faults were studied by Biehl, Meyer and M?uller (2000). The first fault model they consider requires that the input point P in the c...
Mathieu Ciet, Marc Joye
ICC
2009
IEEE
233views Communications» more  ICC 2009»
15 years 4 months ago
Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks
— In this paper, we present an analytical model as well as a practical mechanism to detect denial of service (DoS) attacks on secondary users in dynamic spectrum access (DSA) net...
Z. Jin, S. Anand, K. P. Subbalakshmi