Sciweavers

1575 search results - page 231 / 315
» Simultaneous Source Location
Sort
View
96
Voted
INFOCOM
2009
IEEE
15 years 10 months ago
Identity Aware Sensor Networks
—In a significant class of sensor-network applications, the identities of the reporting sensors constitute the bulk of the communicated data, whereas the message itself can be a...
Lorenzo Keller, Mahdi Jafari Siavoshani, Christina...
112
Voted
WASA
2009
Springer
107views Algorithms» more  WASA 2009»
15 years 10 months ago
Relative Span Weighted Localization of Uncooperative Nodes in Wireless Networks
Abstract. Increasingly ubiquitous wireless technologies require novel localization techniques to pinpoint the position of an uncooperative node, whether the target be a malicious d...
Christine Laurendeau, Michel Barbeau
115
Voted
FC
2009
Springer
106views Cryptology» more  FC 2009»
15 years 10 months ago
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing
Attackers compromise web servers in order to host fraudulent content, such as malware and phishing websites. While the techniques used to compromise websites are widely discussed a...
Tyler Moore, Richard Clayton
130
Voted
ASWEC
2008
IEEE
15 years 10 months ago
An Empirical Study of Evolution of Inheritance in Java OSS
Previous studies of Object-Oriented (OO) software have reported avoidance of the inheritance mechanism and cast doubt on the wisdom of ‘deep’ inheritance levels. From an evolu...
Emal Nasseri, Steve Counsell, M. Shepperd
120
Voted
KBSE
2008
IEEE
15 years 10 months ago
Exploring the composition of unit test suites
In agile software development, test code can considerably contribute to the overall source code size. Being a valuable asset both in terms of verification and documentation, the ...
Bart Van Rompaey, Serge Demeyer