-
2
-
-
78049516304
-
-
Broadband Reports, http://www.dslreports.com, 2010.
-
(2010)
Broadband Reports
-
-
-
3
-
-
78049511373
-
-
HTTP Analyzer, http://www.ieinspector.com/httpanalyzer, 2010.
-
(2010)
HTTP Analyzer
-
-
-
5
-
-
78049506874
-
-
iPass, http://www.ipass.com, 2010.
-
(2010)
IPass
-
-
-
6
-
-
78049524186
-
-
Jiwire, http://www.jiwire.com, 2010.
-
(2010)
Jiwire
-
-
-
7
-
-
78049487542
-
-
Skyhook Wireless, http://www.skyhookwireless.com, 2010.
-
(2010)
Skyhook Wireless
-
-
-
8
-
-
78049510150
-
-
Speedtest.net, http://www.speedtest.net, 2010.
-
(2010)
Speedtest.net
-
-
-
11
-
-
78049494346
-
Fraud and related activity in connection with access devices
-
18 U.S.C. Section 1029
-
Fraud and Related Activity in Connection with Access Devices, Homeland Security Act (18 U.S.C. Section 1029), 2002.
-
(2002)
Homeland Security Act
-
-
-
12
-
-
78049518825
-
Wireless cocation tracking draws privacy questions
-
May
-
"Wireless Location Tracking Draws Privacy Questions," CNET, http://news.com.com/Wireless+location+tracking+draws+ privacy+questions/2100- 1028-3-6072992.html, May 2006.
-
(2006)
CNET
-
-
-
13
-
-
78049511168
-
-
IEEE Std 802.11k-2008 (Amendment to IEEE Std 802.11-2007), IEEE Standard for Information Technology\-Telecommunications and Information Exchange between Systems\-Local and Metropolitan Area Networks\-Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (Phy) Specifications Amendment 1: Radio Resource Measurement of Wireless LANs, IEEE, June 2008
-
IEEE Std 802.11k-2008 (Amendment to IEEE Std 802.11-2007), IEEE Standard for Information Technology\-Telecommunications and Information Exchange between Systems\-Local and Metropolitan Area Networks\-Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (Phy) Specifications Amendment 1: Radio Resource Measurement of Wireless LANs, IEEE, June 2008.
-
-
-
-
14
-
-
34247336855
-
Mobiscopes for human spaces
-
Apr.
-
T. Abdelzaher, Y. Anokwa, P. Boda, J. Burke, D. Estrin, L. Guibas, A. Kansal, S. Madden, and J. Reich, "Mobiscopes for Human Spaces," IEEE Pervasive Computing, vol. 6, no. 2, pp. 20-29, Apr. 2007.
-
(2007)
IEEE Pervasive Computing
, vol.6
, Issue.2
, pp. 20-29
-
-
Abdelzaher, T.1
Anokwa, Y.2
Boda, P.3
Burke, J.4
Estrin, D.5
Guibas, L.6
Kansal, A.7
Madden, S.8
Reich, J.9
-
15
-
-
20844435854
-
Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions
-
June
-
G. Adomavicius and A. Tuzhilin, "Toward the Next Generation of Recommender Systems: A Survey of the State-of-the-Art and Possible Extensions," IEEE Trans. Knowledge and Data Eng., vol. 17, no. 6, pp. 734-749, June 2005.
-
(2005)
IEEE Trans. Knowledge and Data Eng.
, vol.17
, Issue.6
, pp. 734-749
-
-
Adomavicius, G.1
Tuzhilin, A.2
-
17
-
-
20544449100
-
The one-more-rsa-inversion problems and the security of chaum's blind signature scheme
-
M. Bellare, C. Namprempre, D. Pointcheval, and M. Semanko, "The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme," J. Cryptology, vol. 16, no. 3, pp. 185-215, 2003.
-
(2003)
J. Cryptology
, vol.16
, Issue.3
, pp. 185-215
-
-
Bellare, M.1
Namprempre, C.2
Pointcheval, D.3
Semanko, M.4
-
18
-
-
2942524994
-
Location privacy in pervasive computing
-
-Mar.
-
A.R. Beresford and F. Stajano, "Location Privacy in Pervasive Computing," IEEE Pervasive Computing, vol. 2, no. 1, pp. 46-55, Jan.-Mar. 2003.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.1
, pp. 46-55
-
-
Beresford, A.R.1
Stajano, F.2
-
20
-
-
0036993076
-
Collaborative filtering with privacy via factor analysis
-
J. Canny, "Collaborative Filtering with Privacy via Factor Analysis," Proc. SIGIR, 2002.
-
(2002)
Proc. SIGIR
-
-
Canny, J.1
-
21
-
-
0001604533
-
Blind signatures for untraceable payments
-
D. Chaum, "Blind Signatures for Untraceable Payments," Proc. Advances in Cryptology, pp. 199-203, 1982.
-
(1982)
Proc. Advances in Cryptology
, pp. 199-203
-
-
Chaum, D.1
-
22
-
-
84929273746
-
Untraceable electronic cash
-
D. Chaum, A. Fiat, and M. Naor, "Untraceable Electronic Cash," Proc. Ann. Int'l Cryptology Conf. (CRYPTO), pp. 319-327, 1990.
-
(1990)
Proc. Ann. Int'l Cryptology Conf. (CRYPTO)
, pp. 319-327
-
-
Chaum, D.1
Fiat, A.2
Naor, M.3
-
23
-
-
57349110591
-
Anonysense: Privacy-aware people-centric sensing
-
C. Cornelius, A. Kapadia, D. Kotz, D. Peebles, M. Shin, and N. Triandopoulos, "Anonysense: Privacy-Aware People-Centric Sensing," Proc. MobiSys, pp. 211-224, 2008.
-
(2008)
Proc. MobiSys
, pp. 211-224
-
-
Cornelius, C.1
Kapadia, A.2
Kotz, D.3
Peebles, D.4
Shin, M.5
Triandopoulos, N.6
-
25
-
-
78049526178
-
-
Oct.
-
C. Doctorow, "Why Hotel WiFi Sucks," http://www.boingboing. net/2005/10/12/why-hotel-wifi-sucks.html, Oct. 2005.
-
(2005)
Why Hotel WiFi Sucks
-
-
Doctorow, C.1
-
27
-
-
67650661159
-
Improving wireless privacy with an identifier-free link layer protocol
-
B. Greenstein, D. McCoy, J. Pang, T. Kohno, S. Seshan, and D. Wetherall, "Improving Wireless Privacy with an Identifier-Free Link Layer Protocol," Proc. MobiSys, 2008.
-
(2008)
Proc. MobiSys
-
-
Greenstein, B.1
McCoy, D.2
Pang, J.3
Kohno, T.4
Seshan, S.5
Wetherall, D.6
-
29
-
-
78049500647
-
Mark-and-sweep: Getting the inside
-
D. Han, A. Agarwala, D.G. Andersen, M. Kaminsky, K. Papagiannaki, and S. Seshan, "Mark-and-Sweep: Getting the "Inside" Scoop on Neighborhood Networks," Proc. Internet Measurement Conf. (IMC), 2008.
-
(2008)
Scoop on Neighborhood Networks," Proc. Internet Measurement Conf. (IMC)
-
-
Han, D.1
Agarwala, A.2
Andersen, D.G.3
Kaminsky, M.4
Papagiannaki, K.5
Seshan, S.6
-
31
-
-
51249111595
-
Toward community sensing
-
A. Krause, E. Horvitz, A. Kansal, and F. Zhao, "Toward Community Sensing," Proc. Int'l Conf. Information Processing in Sensor Networks (IPSN), 2008.
-
(2008)
Proc. Int'l Conf. Information Processing in Sensor Networks (IPSN)
-
-
Krause, A.1
Horvitz, E.2
Kansal, A.3
Zhao, F.4
-
32
-
-
24944559058
-
Place lab: Device positioning using radio beacons in the wild
-
A. LaMarca, Y. Chawathe, S. Consolvo, J. Hightower, I. Smith, J. Scott, T. Sohn, J. Howard, J. Hughes, F. Potter, J. Tabert, P. Powledge, G. Borriello, and B. Schilit, "Place Lab: Device Positioning Using Radio Beacons in the Wild," Proc. Int'l Conf. Pervasive, 2005.
-
(2005)
Proc. Int'l Conf. Pervasive
-
-
Lamarca, A.1
Chawathe, Y.2
Consolvo, S.3
Hightower, J.4
Smith, I.5
Scott, J.6
Sohn, T.7
Howard, J.8
Hughes, J.9
Potter, F.10
Tabert, J.11
Powledge, P.12
Borriello, G.13
Schilit, B.14
-
33
-
-
33748982833
-
Improved access point selection
-
A.J. Nicholson, Y. Chawathe, M.Y. Chen, B.D. Noble, and D. Wetherall, "Improved Access Point Selection," Proc. MobiSys, 2006.
-
(2006)
Proc. MobiSys
-
-
Nicholson, A.J.1
Chawathe, Y.2
Chen, M.Y.3
Noble, B.D.4
Wetherall, D.5
-
34
-
-
78049513446
-
-
v. 2009-04-15 Apr.
-
J. Pang, CRAWDAD Data Set cmu/hotspot (v. 2009-04-15), http://crawdad.cs.dartmouth.edu/cmu/hotspot, Apr. 2009.
-
(2009)
CRAWDAD Data Set Cmu/hotspot
-
-
Pang, J.1
-
36
-
-
84866369989
-
Tryst: The case for confidential service discovery
-
J. Pang, B. Greenstein, D. Mccoy, S. Seshan, and D. Wetherall, "Tryst: The Case for Confidential Service Discovery," Proc. Workshop Hot Topics in Networks (HotNets), 2007.
-
(2007)
Proc. Workshop Hot Topics in Networks (HotNets)
-
-
Pang, J.1
Greenstein, B.2
McCoy, D.3
Seshan, S.4
Wetherall, D.5
-
37
-
-
0344152271
-
Bandwidth estimation: Metrics, measurement techniques, and tools
-
Nov./Dec.
-
R.S. Prasad, M. Murray, C. Dovrolis, and K. Claffy, "Bandwidth Estimation: Metrics, Measurement Techniques, and Tools," IEEE Network, vol. 17, no. 6, pp. 27-35, Nov./Dec. 2003.
-
(2003)
IEEE Network
, vol.17
, Issue.6
, pp. 27-35
-
-
Prasad, R.S.1
Murray, M.2
Dovrolis, C.3
Claffy, K.4
-
41
-
-
42149173353
-
Facilitating access point selection in ieee 802.11 wireless networks
-
S. Vasudevan, K. Papagiannaki, C. Diot, J. Kurose, and D. Towsley, "Facilitating Access Point Selection in IEEE 802.11 Wireless Networks," Proc. Internet Measurement Conf. (IMC), 2005.
-
(2005)
Proc. Internet Measurement Conf. (IMC)
-
-
Vasudevan, S.1
Papagiannaki, K.2
Diot, C.3
Kurose, J.4
Towsley, D.5
-
43
-
-
45749116664
-
Sybillimit: A near-optimal social network defense against sybil attacks
-
H. Yu, P.B. Gibbons, M. Kaminsky, and F. Xiao, "SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks," Proc. IEEE Int'l Symp. Security and Privacy, 2008.
-
(2008)
Proc. IEEE Int'l Symp. Security and Privacy
-
-
Yu, H.1
Gibbons, P.B.2
Kaminsky, M.3
Xiao, F.4
-
44
-
-
70449670722
-
Dsybil: Optimal sybil-resistance for recommendation systems
-
H. Yu, C. Shi, M. Kaminsky, P.B. Gibbons, and F. Xiao, "DSybil: Optimal Sybil-Resistance for Recommendation Systems," Proc. IEEE Int'l Symp. Security and Privacy, 2009.
-
(2009)
Proc. IEEE Int'l Symp. Security and Privacy
-
-
Yu, H.1
Shi, C.2
Kaminsky, M.3
Gibbons, P.B.4
Xiao, F.5
|