Sciweavers

16883 search results - page 123 / 3377
» Generalized Non-Reducible Descriptors
Sort
View
134
Voted
MMSEC
2006
ACM
129views Multimedia» more  MMSEC 2006»
15 years 10 months ago
WLAN steganography: a first practical review
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network are introduced in this paper. First test results on the reliability, undetectab...
Christian Krätzer, Jana Dittmann, Andreas Lan...
MOBICOM
2006
ACM
15 years 10 months ago
An identity-based security framework For VANETs
We present a security framework for Vehicular Ad hoc Networks (VANETs), using identity-based cryptography, to provide authentication, confidentiality, non-repudiation and message...
Pandurang Kamat, Arati Baliga, Wade Trappe
134
Voted
MSR
2006
ACM
15 years 10 months ago
Mining additions of method calls in ArgoUML
In this paper we refine the classical co-change to the addition of method calls. We use this concept to find usage patterns and to identify cross-cutting concerns for ArgoUML. C...
Thomas Zimmermann, Silvia Breu, Christian Lindig, ...
PODC
2006
ACM
15 years 10 months ago
Timeliness, failure-detectors, and consensus performance
We study the implication that various timeliness and failure detector assumptions have on the performance of consensus algorithms that exploit them. We present a general framework...
Idit Keidar, Alexander Shraer
SIGIR
2006
ACM
15 years 10 months ago
Stylistic text segmentation
This paper focuses on a method for the stylistic segmentation of text documents. Our technique involves mapping the change in a feature throughout a text. We use the linguistic fe...
Paul J. Chase, Shlomo Argamon