Sciweavers

819 search results - page 45 / 164
» Acknowledgements
Sort
View
SOCO
2011
Springer
13 years 3 months ago
Retransmission steganography and its detection
The paper presents a new steganographic method called RSTEG (retransmission steganography), which is intended for a broad class of protocols that utilises retransmission mechanisms...
Wojciech Mazurczyk, Milosz Smolarczyk, Krzysztof S...
JCIT
2010
161views more  JCIT 2010»
13 years 3 months ago
Improvement on Intrusion Detection Technology Based on Protocol Analysis and Pattern Matching
With the development of high-speed network technique and increasing volume of network traffic, traditional pattern matching method can't adapt to the new challenges to intrus...
Liang Hu, Kuo Tang, Yu Ku, Kuo Zhao
ICASSP
2011
IEEE
13 years 15 days ago
Collision resolution in multiple access networks with physical-layer network coding and distributed fountain coding
—We propose two new protocols based on physical layer network coding for collision resolution in multiple access networks. When a collision occurs the receiver decodes the sum of...
Giuseppe Cocco, Christian Ibars, Deniz Günd&u...
AAAI
2011
12 years 8 months ago
Incentive-Compatible Escrow Mechanisms
The most prominent way to establish trust between buyers and sellers on online auction sites are reputation mechanisms. Two drawbacks of this approach are the reliance on the sell...
Jens Witkowski, Sven Seuken, David C. Parkes
HICSS
2012
IEEE
322views Biometrics» more  HICSS 2012»
12 years 4 months ago
Exploring the Motive for Data Publication in Open Data Initiative: Linking Intention to Action
This research study was designed to broaden understanding of the publishing of research datasets by distinguishing between the intention to share and the action of sharing. The da...
Djoko Sigit Sayogo, Theresa A. Pardo