Fingerprint (computing)

Known as: Fingerprint (disambiguation), Fingerprinting algorithm, Fingerprinting algorithms 
In computer science, a fingerprinting algorithm is a procedure that maps an arbitrarily large data item (such as a computer file) to a much shorter… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Wireless local area networks (WLANs) have become a promising choice for indoor positioning as the only existing and established… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
Review
2017
Review
2017
The deployment of Internet of Things (IoT) devices and services is accelerating, aided by ubiquitous wireless connectivity… (More)
Is this relevant?
Review
2017
Review
2017
Localization has attracted a lot of research effort in the last decade due to the explosion of location based service (LBS). In… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
A growing number of mobile computing applications are centered around the user's location. The notion of location is broad… (More)
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to their much lower cost structure… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
In previous years, positioning systems for indoor areas using the existing wireless local area network infrastructure have been… (More)
  • figure 1
  • figure 2
  • figure 3
  • table II
  • figure 4
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Indoor positioning systems that make use of received signal strength based location fingerprints and existing wireless local area… (More)
  • figure 1
  • figure 2
  • table 1
  • table 4
  • figure 3
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We construct binary codes for fingerprinting. Our codes for n users that are ε-secure against c pirates have length O(c2 log(n… (More)
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Imagine the following situation. You’re in your car, listening to the radio and suddenly you hear a song that catches your… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
1999
Highly Cited
1999
 The BARE-1 retrotransposon is an active, dispersed, and highly abundant component of the genome of barley (Hordeum vulgare) and… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?