Sciweavers

2347 search results - page 80 / 470
» Location, location, location: a study of bluejacking practic...
Sort
View
RFIDSEC
2010
14 years 8 months ago
Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones
NFC is a standardised technology providing short-range RFID communication channels for mobile devices. Peer-to-peer applications for mobile devices are receiving increased interest...
Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Ko...
CGO
2011
IEEE
14 years 1 months ago
Practical memory checking with Dr. Memory
—Memory corruption, reading uninitialized memory, using freed memory, and other memory-related errors are among the most difficult programming bugs to identify and fix due to t...
Derek Bruening, Qin Zhao
PE
2007
Springer
100views Optimization» more  PE 2007»
14 years 9 months ago
Remote analysis of a distributed WLAN using passive wireless-side measurement
This paper presents network traffic measurements from a campus-wide wireless LAN (WLAN), with the data collected using remote passive wireless-side measurement. We used commercia...
Aniket Mahanti, Carey L. Williamson, Martin F. Arl...
SIGMOD
2011
ACM
247views Database» more  SIGMOD 2011»
14 years 20 days ago
Collective spatial keyword querying
With the proliferation of geo-positioning and geo-tagging, spatial web objects that possess both a geographical location and a textual description are gaining in prevalence, and s...
Xin Cao, Gao Cong, Christian S. Jensen, Beng Chin ...
ICIP
2009
IEEE
15 years 11 months ago
Object Detection Via Boosted Deformable Features
It is a common practice to model an object for detection tasks as a boosted ensemble of many models built on features of the object. In this context, features are defined as subre...