Sciweavers

2795 search results - page 289 / 559
» Recommended or Not
Sort
View
NDSS
2002
IEEE
15 years 6 months ago
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP
We implemented an attack against WEP, the link-layer security protocol for 802.11 networks. The attack was described in a recent paper by Fluhrer, Mantin, and Shamir. With our imp...
Adam Stubblefield, John Ioannidis, Aviel D. Rubin
WECWIS
2002
IEEE
120views ECommerce» more  WECWIS 2002»
15 years 6 months ago
QoS Management in Web-based Real-Time Data Services
The demand for real-time data services has been increasing recently. Many e-commerce applications and webbased information services are becoming very sophisticated in their data n...
Sang Hyuk Son, Kyoung-Don Kang
CDC
2009
IEEE
119views Control Systems» more  CDC 2009»
15 years 5 months ago
Output feedback strategies for systems with impulsive and fast controls
— This paper deals with output feedback impulse control under set-membership uncertainty where the control realization consists of a sequence of δ-impulses. It indicates solutio...
Alexander N. Daryin, Irina A. Digailova, Alexander...
COLCOM
2009
IEEE
15 years 5 months ago
Information retrieval on mind maps - what could it be good for?
—Mind maps are used by millions of people. In this paper we present how information retrieval on mind maps could be used to enhance expert search, document summarization, keyword...
Jöran Beel, Bela Gipp, Jan-Olaf Stiller
SIGCSE
2009
ACM
127views Education» more  SIGCSE 2009»
15 years 5 months ago
Acm education board and masters level programs
This special session will proved information about the status of work related to Masters programs in Computing. Specifically, the session will describe work completed in the follo...
Gordon Davies, Lillian N. Cassel, Arthur B. Pyster...