Sciweavers

4164 search results - page 814 / 833
» Application and desktop sharing
Sort
View
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 9 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
CORR
2007
Springer
128views Education» more  CORR 2007»
13 years 9 months ago
Ambient Multimodality: an Asset for Developing Universal Access to the Information Society
Our aim is to point out the benefits that can be derived from research advances in the implementation of concepts such as ambient intelligence and ubiquitous/pervasive computing f...
Noelle Carbonell
JNW
2008
117views more  JNW 2008»
13 years 9 months ago
An Intelligent Multicast Ad-hoc On demand Distance Vector Protocol for MANETs
-Recently multicast routing protocols in Mobile Ad-hoc Networks (MANETs) are emerging for wireless group communication. This includes application such as multipoint data disseminat...
E. Baburaj, V. Vasudevan
JCP
2006
157views more  JCP 2006»
13 years 9 months ago
An Infrastructure for Service Oriented Sensor Networks
Emerging wireless technologies enable ubiquitous access to networked services. Integration of wireless technologies into sensor and actuator nodes provides the means for remote acc...
Åke Östmark, Jens Eliasson, Per Lindgre...
JSS
2008
91views more  JSS 2008»
13 years 9 months ago
A parametrized algorithm that implements sequential, causal, and cache memory consistencies
In this paper, we present an algorithm that can be used to implement sequential, causal, or cache consistency in distributed shared memory (DSM) systems. For this purpose it inclu...
Ernesto Jiménez, Antonio Fernández, ...