Sciweavers

602 search results - page 47 / 121
» NetRaker suite: a demonstration
Sort
View
INFOCOM
2011
IEEE
14 years 2 months ago
Identifying mobiles hiding behind wireless routers
—The network address translation technique (NAT) is widely used in wireless routers. It is a low cost solution to IPv4 address space limitations. However, cyber criminals may abu...
Yinjie Chen, Zhongli Liu, Benyuan Liu, Xinwen Fu, ...
INFOCOM
2011
IEEE
14 years 2 months ago
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
—Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Severa...
Qian Wang, Hai Su, Kui Ren, Kwangjo Kim
ICCV
2011
IEEE
13 years 10 months ago
Smooth Object Retrieval using a Bag of Boundaries
We describe a scalable approach to 3D smooth object retrieval which searches for and localizes all the occurrences of a user outlined object in a dataset of images in real time. T...
Relja Arandjelovic, Andrew Zisserman
ICDAR
2011
IEEE
13 years 10 months ago
BLSTM Neural Network Based Word Retrieval for Hindi Documents
—Retrieval from Hindi document image collections is a challenging task. This is partly due to the complexity of the script, which has more than 800 unique ligatures. In addition,...
Raman Jain, Volkmar Frinken, C. V. Jawahar, Raghav...
PAM
2012
Springer
13 years 6 months ago
Probe and Pray: Using UPnP for Home Network Measurements
Network measurement practitioners increasingly focus their interest on understanding and debugging home networks. The Universal Plug and Play (UPnP) technology holds promise as a h...
Lucas DiCioccio, Renata Teixeira, Martin May, Chri...