Trace selection for improved WLAN monitoring

M Sammarco, MEM Campista… - Proceedings of the 5th …, 2013 - dl.acm.org
Existing measurement techniques for IEEE~ 802.11-based networks assume that the higher
the density of monitors in the target area, the higher the quality of the measure. This …

A walk on the client side: Monitoring enterprise wifi networks using smartphone channel scans

J Shi, L Meng, A Striegel, C Qiao… - … INFOCOM 2016-the …, 2016 - ieeexplore.ieee.org
During the one minute it takes to read this abstract, two billion smartphones worldwide will
perform billions of Wifi channel scans recording the signal strength of nearby Wifi Access …

[BUKU][B] Privacy-aware knowledge discovery: novel applications and new techniques

F Bonchi, E Ferrari - 2010 - books.google.com
Covering research at the frontier of this field, this volume presents state-of-the-art privacy-
preserving data mining techniques for application domains, such as medicine and social …

Map** the urban wireless landscape with Argos

I Rose, M Welsh - Proceedings of the 8th ACM conference on embedded …, 2010 - dl.acm.org
Passive monitoring is an important tool for measuring, troubleshooting, and protecting
modern wireless networks. To date, WiFi monitoring has focused primarily on indoor settings …

Multi-agent system to monitor oceanic environments

J Bajo, JF De Paz, S Rodriguez… - Integrated Computer …, 2010 - content.iospress.com
The exchange of CO 2 between the atmosphere and the ocean surface is a problem that has
become increasingly important due to its impact on climatic behavior. Given the large …

Sniffing only control packets: a lightweight client-side WiFi traffic characterization solution

L Song, A Striegel, A Mohammed - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
The advancement of the Internet of Things (IoT) is bringing unprecedented convenience into
our daily life. However, with the relentlessly increasing number of mobile devices connected …

A benchmark suite for evaluating configurable computing systems—status, reflections, and future directions

S Kumar, L Pires, S Ponnuswamy, C Nanavati… - Proceedings of the …, 2000 - dl.acm.org
This paper presents a benchmark suite for evaluating a configurable computing system's
infrastructure, both tools and architecture. A novel aspect of this work is the use of …

Distributed monitoring of conditional entropy for anomaly detection in streams

C Arackaparambil, S Bratus, J Brody… - … on Parallel & …, 2010 - ieeexplore.ieee.org
In this work we consider the problem of monitoring information streams for anomalies in a
scalable and efficient manner. We study the problem in the context of network streams …

From MAP to DIST: the evolution of a large-scale WLAN monitoring system

K Tan, C McDonald, B Vance… - IEEE Transactions …, 2012 - ieeexplore.ieee.org
The edge of the Internet is increasingly becoming wireless. Therefore, monitoring the
wireless edge is important to understanding the security and performance aspects of the …

Design and implementation of a sensor-based wireless camera system for continuous monitoring in assistive environments

N Li, B Yan, G Chen, P Govindaswamy… - Personal and Ubiquitous …, 2010 - Springer
Camera-based surveillance system is an important tool for assistive environment to monitor
those who may have physical or cognitive impairment. It is, however, expensive to deploy a …