Sciweavers

2068 search results - page 338 / 414
» Performance Analysis of a Distributed Wireless Access Scheme
Sort
View
ECRIME
2007
15 years 1 months ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
MOBIHOC
2010
ACM
14 years 8 months ago
Barrier coverage with sensors of limited mobility
Barrier coverage is a critical issue in wireless sensor networks for various battlefield and homeland security applications. The goal is to effectively detect intruders that attem...
Anwar Saipulla, Benyuan Liu, Guoliang Xing, Xinwen...
JSSPP
2009
Springer
15 years 4 months ago
Competitive Two-Level Adaptive Scheduling Using Resource Augmentation
Abstract. As multi-core processors proliferate, it has become more important than ever to ensure efficient execution of parallel jobs on multiprocessor systems. In this paper, we s...
Hongyang Sun, Yangjie Cao, Wen-Jing Hsu
ISMIR
2005
Springer
176views Music» more  ISMIR 2005»
15 years 3 months ago
On the Modeling of Time Information for Automatic Genre Recognition Systems in Audio Signals
The creation of huge databases coming from both restoration of existing analogue archives and new content is demanding fast and more and more reliable tools for content analysis a...
Nicolas Scaringella, Giorgio Zoia
MOBISYS
2003
ACM
15 years 9 months ago
An Entity Maintenance and Connection Service for Sensor Networks
In this paper, we present a middleware architecture for coordination services in sensor networks that facilitates interaction between groups of sensors which monitor different env...
Brian M. Blum, Prashant Nagaraddi, Anthony D. Wood...