-
1
-
-
36949029788
-
Towards highly reliable enterprise network services via inference of multi-level dependencies
-
P. Bahl, R. Chandra, A. Greenberg, S. Kandula, D. Maltz, and M. Zhang. Towards highly reliable enterprise network services via inference of multi-level dependencies. In Proc. of ACM SIGCOMM, 2007.
-
Proc. of ACM SIGCOMM, 2007
-
-
Bahl, P.1
Chandra, R.2
Greenberg, A.3
Kandula, S.4
Maltz, D.5
Zhang, M.6
-
2
-
-
0033872896
-
RADAR: An in-building RF-based user location and tracking system
-
P. Bahl and V. Padmanabhan. RADAR: An in-building RF-based user location and tracking system. In Proc. of IEEE Infocom, pages 775-784, 2000.
-
(2000)
Proc. of IEEE Infocom
, pp. 775-784
-
-
Bahl, P.1
Padmanabhan, V.2
-
4
-
-
70349147400
-
Practical attacks against WEP and WPA
-
M. Beck and E. Tews. Practical attacks against WEP and WPA. In Proc. of ACM WiSec, pages 79-86, 2009.
-
(2009)
Proc. of ACM WiSec
, pp. 79-86
-
-
Beck, M.1
Tews, E.2
-
6
-
-
60149107046
-
Modulation rate adaptation in urban and vehicular environments: Cross-layer implementation and experimental evaluation
-
Sept.
-
J. Camp and E. Knightly. Modulation rate adaptation in urban and vehicular environments: Cross-layer implementation and experimental evaluation. In Proc. of ACM MobiCom, pages 315-326, Sept. 2008.
-
(2008)
Proc. of ACM MobiCom
, pp. 315-326
-
-
Camp, J.1
Knightly, E.2
-
7
-
-
84856542731
-
Radio-layer security: Detecting identity-based attacks in wireless networks using signalprints
-
D. Faria and D. Cheriton. Radio-layer security: Detecting identity-based attacks in wireless networks using signalprints. In Proc. of ACM WiSe, 2006.
-
Proc. of ACM WiSe, 2006
-
-
Faria, D.1
Cheriton, D.2
-
8
-
-
80052013888
-
Lax security led to TJX breach
-
May
-
D. Goodin. Lax security led to TJX breach. The Register, May 2007. http://www.theregister.co.uk/2007/05/04/txj-nonfeasance.
-
(2007)
The Register
-
-
Goodin, D.1
-
9
-
-
78650922110
-
Detailed diagnosis in enterprise networks
-
S. Kandula, R. Mahajan, P. Verkaik, S. Agarwal, J. Padhye, and P. Bahl. Detailed diagnosis in enterprise networks. In Proc. of ACM SIGCOMM, 2009.
-
Proc. of ACM SIGCOMM, 2009
-
-
Kandula, S.1
Mahajan, R.2
Verkaik, P.3
Agarwal, S.4
Padhye, J.5
Bahl, P.6
-
10
-
-
37749047975
-
Robust location distinction using temporal link signatures
-
Sept.
-
N. Patwari and S. Kasera. Robust location distinction using temporal link signatures. In Proc. of the acm MobiCom Conf., pages 111-122, Sept. 2007.
-
(2007)
Proc. of the Acm MobiCom Conf.
, pp. 111-122
-
-
Patwari, N.1
Kasera, S.2
-
11
-
-
0031338376
-
Robust Frequency and Timing Synchroniation for OFDM
-
Dec.
-
T. M. Schmidl and D. C. Cox. Robust Frequency and Timing Synchroniation for OFDM. IEEE Trans. on Communications, 45(12):1613-1621, Dec. 1997.
-
(1997)
IEEE Trans. on Communications
, vol.45
, Issue.12
, pp. 1613-1621
-
-
Schmidl, T.M.1
Cox, D.C.2
-
12
-
-
0022683359
-
Multiple emitter location and signal parameter estimation
-
Mar.
-
R. Schmidt. Multiple emitter location and signal parameter estimation. ieee Trans. on Antennas and Propagation, ap-34(3):276-280, Mar. 1986.
-
(1986)
Ieee Trans. on Antennas and Propagation
, vol.AP-34
, Issue.3
, pp. 276-280
-
-
Schmidt, R.1
-
15
-
-
70450239608
-
SAM: Enabling practical spatial multiple access in wireless LAN
-
K. Tan, H. Liu, J. Fang, W. Wang, J. Zhang, M. Chen, and G. Voelker. SAM: Enabling practical spatial multiple access in wireless LAN. In Proc. of ACM MobiCom, 2009.
-
Proc. of ACM MobiCom, 2009
-
-
Tan, K.1
Liu, H.2
Fang, J.3
Wang, W.4
Zhang, J.5
Chen, M.6
Voelker, G.7
-
17
-
-
58149114485
-
Using WLAN infrastructure for angle-of-arrival indoor user location
-
Sept.
-
C. Wong, R. Klukas, and G. Messier. Using WLAN infrastructure for angle-of-arrival indoor user location. In Proc. of the IEEE VTC Conf., pages 1-5, Sept. 2008.
-
(2008)
Proc. of the IEEE VTC Conf.
, pp. 1-5
-
-
Wong, C.1
Klukas, R.2
Messier, G.3
|