Sciweavers

1050 search results - page 56 / 210
» Two methods of authenticated positioning
Sort
View
ACSW
2006
15 years 1 months ago
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...
Rupinder Gill, Jason Smith, Andrew Clark
AROBOTS
2008
131views more  AROBOTS 2008»
14 years 11 months ago
Active audition using the parameter-less self-organising map
This paper presents a novel method for enabling a robot to determine the position of a sound source in three dimensions using just two microphones and interaction with its environm...
Erik Berglund, Joaquin Sitte, Gordon Wyeth
MLDM
2007
Springer
15 years 6 months ago
PE-PUC: A Graph Based PU-Learning Approach for Text Classification
This paper presents a novel solution for the problem of building text classifier using positive documents (P) and unlabeled documents (U). Here, the unlabeled documents are mixed w...
Shuang Yu, Chunping Li
TIP
2008
139views more  TIP 2008»
14 years 11 months ago
Model-Based 2.5-D Deconvolution for Extended Depth of Field in Brightfield Microscopy
Abstract--Due to the limited depth of field of brightfield microscopes, it is usually impossible to image thick specimens entirely in focus. By optically sectioning the specimen, t...
François Aguet, Dimitri Van De Ville, Micha...
INFOCOM
2012
IEEE
13 years 2 months ago
The Variable-Increment Counting Bloom Filter
—Counting Bloom Filters (CBFs) are widely used in networking device algorithms. They implement fast set representations to support membership queries with limited error, and supp...
Ori Rottenstreich, Yossi Kanizo, Isaac Keslassy