Scaffolding techniques allow human instructors to support novice learners in critical early stages, and to remove that support as expertise grows. This paper describes nAble, an a...
Joseph MacInnes, Stephanie Santosa, Nathan Kronenf...
Abstract. Steganalysis consists in classifying documents as steganographied or genuine. This paper presents a methodology for steganalysis based on a set of 193 features with two m...
Yoan Miche, Patrick Bas, Amaury Lendasse, Christia...
1 TetherNet is a system for dynamically relocating Internet subnets. It provides real Internet service consisting of real IP addresses, and forward and reverse DNS, even behind NAT...
We study the stability of the commonly used packet forwarding protocol, FIFO (First In First Out), in the adversarial queueing model. We prove that FIFO can become unstable, i.e.,...
We present an effective way to improve the quality of unicast routes determined by the LAR Box method. Our method uses the location information acquired by LAR itself to determine ...