Sciweavers

48 search results - page 5 / 10
» Hide and Seek in Time - Robust Covert Timing Channels
Sort
View
CORR
2008
Springer
140views Education» more  CORR 2008»
13 years 7 months ago
Steganography of VoIP streams
The paper concerns available steganographic techniques that can be used for creating covert channels for VoIP (Voice over Internet Protocol) streams. Apart from characterizing exis...
Wojciech Mazurczyk, Krzysztof Szczypiorski
CDC
2009
IEEE
124views Control Systems» more  CDC 2009»
14 years 1 months ago
Boundary feedback control for heat exchange enhancement in 2D magnetohydrodynamic channel flow by extremum seeking
Abstract— The heat exchange efficiency of electrically conducting fluids can drop dramatically when they interact with externally imposed magnetic fields. The movement of such...
Lixiang Luo, Eugenio Schuster
CCS
2004
ACM
14 years 1 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
INFOCOM
2003
IEEE
14 years 1 months ago
Optimal Energy Allocation for Delay-Constrained Data Transmission over a Time-Varying Channel
— We seek to maximize the data throughput of an energy and time constrained transmitter sending data over a fading channel. The transmitter has a fixed amount of energy and a li...
Alvin Fu, Eytan Modiano, John N. Tsitsiklis
ISORC
2000
IEEE
14 years 28 days ago
A Distributed Real-Time Java System Based on CSP
CSP is a fundamental concept for developing software for distributed real-time systems. The CSP paradigm constitutes a natural addition to Object Orientation and offers higherorde...
Gerald H. Hilderink, Andry W. P. Bakkers, Jan F. B...