Sciweavers

73 search results - page 6 / 15
» An Approach to Analyzing the Need for Meta-Level Communicati...
Sort
View
INFOCOM
2009
IEEE
14 years 2 months ago
Building Covert Channels over the Packet Reordering Phenomenon
Abstract—New modes of communication have shown themselves to be needed for more secure and private types of data. Steganography or data-hiding through covert channels can be high...
Adel El-Atawy, Ehab Al-Shaer
RULEML
2005
Springer
14 years 1 months ago
Extending the SweetDeal Approach for e-Procurement Using SweetRules and RuleML
We show the first detailed realistic e-business application scenario that uses and exploits capabilities of the SweetRules V2.1 toolset for e-contracting using the SweetDeal approa...
Sumit Bhansali, Benjamin N. Grosof
AIED
2007
Springer
14 years 2 months ago
Profiling Student Interactions in Threaded Discussions with Speech Act Classifiers
On-line discussion is a popular form of web-based computer-mediated communication and is an important medium for distance education. Automatic tools for analyzing online discussion...
Sujith Ravi, Jihie Kim
BROADCOM
2008
IEEE
13 years 9 months ago
Tree Based Flooding Protocol for Multi-hop Wireless Networks
In this paper we propose and analyze an efficient flooding technique for static multi-hop wireless networks. The protocol builds up a routing tree that connects all network nodes....
Raphael Frank, Thomas Scherer, Thomas Engel
WD
2010
13 years 5 months ago
Self-organized aggregation in irregular wireless networks
Gossip-based epidemic protocols are used to aggregate data in distributed systems. This fault-tolerant approach does neither require maintenance of any global network state nor kno...
Joanna Geibig, Dirk Bradler