Sciweavers

6122 search results - page 1127 / 1225
» Securing network access in wireless sensor networks
Sort
View
NSDI
2008
15 years 7 days ago
Exploiting Machine Learning to Subvert Your Spam Filter
Using statistical machine learning for making security decisions introduces new vulnerabilities in large scale systems. This paper shows how an adversary can exploit statistical m...
Blaine Nelson, Marco Barreno, Fuching Jack Chi, An...
VTC
2006
IEEE
101views Communications» more  VTC 2006»
15 years 3 months ago
Coexistence and Interworking of IEEE 802.16 and IEEE 802.11(e)
— The coexistence and interworking of IEEE 802.16 and IEEE 802.11 is an acute problem. The frame-based medium access of 802.16 requires rigorous protection against interference f...
Lars Berlemann, Christian Hoymann, Guido R. Hiertz...
MOBIQUITOUS
2005
IEEE
15 years 3 months ago
Multivariate Analysis for Probabilistic WLAN Location Determination Systems
WLAN location determination systems are gaining increasing attention due to the value they add to wireless networks. In this paper, we present a multivariate analysis technique fo...
Moustafa Youssef, Mohamed Abdallah
WETICE
2009
IEEE
15 years 4 months ago
Cloud Computing and the Lessons from the Past
— The skyrocketing demand for a new generation of cloud-based consumer and business applications is driving the need for next generation of datacenters that must be massively sca...
Rao Mikkilineni, Vijay Sarathy
MOBISYS
2009
ACM
15 years 10 months ago
SoundSense: scalable sound sensing for people-centric applications on mobile phones
Top end mobile phones include a number of specialized (e.g., accelerometer, compass, GPS) and general purpose sensors (e.g., microphone, camera) that enable new people-centric sen...
Hong Lu, Wei Pan, Nicholas D. Lane, Tanzeem Choudh...
« Prev « First page 1127 / 1225 Last » Next »