Sciweavers

1456 search results - page 245 / 292
» An Overview of the SODA System
Sort
View
COMSUR
2007
101views more  COMSUR 2007»
13 years 10 months ago
A survey of covert channels and countermeasures in computer network protocols
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
JCP
2008
160views more  JCP 2008»
13 years 10 months ago
A Bluetooth-based Sensor Node for Low-Power Ad Hoc Networks
TCP/IP has recently taken promising steps toward being a viable communication architecture for networked sensor nodes. Furthermore, the use of Bluetooth can enable a wide range of ...
Jens Eliasson, Per Lindgren, Jerker Delsing
JNW
2008
79views more  JNW 2008»
13 years 10 months ago
Smart Classrooms for Distance Education and their Adoption to Multiple Classroom Architecture
This paper provides an overview of the technologies used in smart classrooms for distance education by classifying smart classrooms into four categories and discussing the type of ...
Davar Pishva, G. G. D. Nishantha
LOGCOM
2008
110views more  LOGCOM 2008»
13 years 10 months ago
Sum and Product in Dynamic Epistemic Logic
The Sum-and-Product riddle was first published in [Fre69]. We provide an overview on the history of the dissemination of this riddle through the academic and puzzle-math community...
Hans P. van Ditmarsch, Ji Ruan, Rineke Verbrugge
IEE
2007
120views more  IEE 2007»
13 years 10 months ago
Classification of model transformation techniques used in UML-based Web engineering
Software development techniques are continuously evolving with the goal of solving the main problems that still affect the building and maintenance of software systems: time, cost...
N. Koch