Sciweavers

2340 search results - page 391 / 468
» Data abstraction and information hiding
Sort
View
INFOCOM
2009
IEEE
14 years 2 months ago
Building Covert Channels over the Packet Reordering Phenomenon
Abstract—New modes of communication have shown themselves to be needed for more secure and private types of data. Steganography or data-hiding through covert channels can be high...
Adel El-Atawy, Ehab Al-Shaer
IROS
2009
IEEE
180views Robotics» more  IROS 2009»
14 years 2 months ago
HELIOS system: A team of tracked robots for special urban search and rescue operations
Abstract— Fire brigades and special agencies are often demanded to operate for search and aid of human lives in extremely dangerous scenarios. It is very important to first veri...
Michele Guarnieri, Ryo Kurazume, Hiroshi Masuda, T...
BPM
2009
Springer
258views Business» more  BPM 2009»
14 years 2 months ago
Activity Mining by Global Trace Segmentation
Process Mining is a technology for extracting non-trivial and useful information from execution logs. For example, there are many process mining techniques to automatically discove...
Christian W. Günther, Anne Rozinat, Wil M. P....
CPAIOR
2009
Springer
14 years 2 months ago
Learning How to Propagate Using Random Probing
Abstract. In constraint programming there are often many choices regarding the propagation method to be used on the constraints of a problem. However, simple constraint solvers usu...
Efstathios Stamatatos, Kostas Stergiou
KIVS
2009
Springer
14 years 2 months ago
Towards the Design of Unexploitable Construction Mechanisms for Multiple-Tree Based P2P Streaming Systems
Abstract. In peer-to-peer based live streaming systems, a great number of participants have to cooperate to efficiently and reliably distribute a continuous flow of data. Each rec...
Michael Brinkmeier, Mathias Fischer, Sascha Grau, ...