Sciweavers

1722 search results - page 94 / 345
» Dedication
Sort
View
NOSSDAV
2005
Springer
14 years 3 months ago
Retransmission in distributed media streaming
This paper considers the use of Automatic Request Request (ARQ) schemes in distributed media streaming. We analytically model three different ARQ schemes and derive effective pac...
Lin Ma, Wei Tsang Ooi
SOCO
2005
Springer
14 years 3 months ago
Directory Support for Large-Scale, Automated Service Composition
In an open environment populated by large numbers of services, automated service composition is a major challenge. In such a setting the efficient interaction of directory-based s...
Walter Binder, Ion Constantinescu, Boi Faltings
SPC
2005
Springer
14 years 3 months ago
A Theorem Proving Approach to Analysis of Secure Information Flow
Abstract. Most attempts at analysing secure information flow in programs are based on domain-specific logics. Though computationally feahese approaches suffer from the need for ...
Ádám Darvas, Reiner Hähnle, Dav...
TCC
2005
Springer
77views Cryptology» more  TCC 2005»
14 years 3 months ago
Upper and Lower Bounds on Black-Box Steganography
We study the limitations of steganography when the sender is not using any properties of the underlying channel beyond its entropy and the ability to sample from it. On the negati...
Nenad Dedic, Gene Itkis, Leonid Reyzin, Scott Russ...
ITICSE
2004
ACM
14 years 3 months ago
Teaching operating systems administration with user mode linux
User Mode Linux is a virtual machine running on a GNULinux operating system. It is the right choice for teaching operating systems’ administration, as it does not need any dedic...
Renzo Davoli