Sciweavers

1740 search results - page 251 / 348
» Group communication protocol for flexible distributed system...
Sort
View
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 8 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
ECAI
2004
Springer
14 years 2 months ago
An architecture based on semantic weblogs for exploring the Web of People
This paper presents an architecture that helps users to collect and qualify meta-information about web resources within a weblog and then share them with a group of people. Our arc...
Tuan-Anh Ta, Jean-Marc Saglio, Michel Plu
HICSS
2000
IEEE
132views Biometrics» more  HICSS 2000»
14 years 1 months ago
The Impacts of Relational and Trust Development Training on Virtual Teams: An Exploratory Investigation
Virtual teams are becoming common place in many organizations. These teams are geographically distributed and communicate via computer-mediated communication systems. Two factors ...
Peggy M. Beranek
NOSSDAV
2004
Springer
14 years 2 months ago
Connectivity restrictions in overlay multicast
A large number of overlay multicast protocols have been developed, almost all of which assume universal connectivity between end hosts. However, in reality, this assumption is not...
Aditya Ganjam, Hui Zhang
CL
2007
Springer
13 years 8 months ago
A bulk-synchronous parallel process algebra
The CCS (Calculus of Communicating Systems) process algebra is a well-known formal model of synchronization and communication. It is used for the analysis of safety and liveness i...
Armelle Merlin, Gaétan Hains