Sciweavers

2643 search results - page 132 / 529
» Higher order messaging
Sort
View
NSDI
2007
15 years 6 months ago
Information Slicing: Anonymity Using Unreliable Overlays
This paper proposes a new approach to anonymous communication called information slicing. Typically, anonymizers use onion routing, where a message is encrypted in layers with the...
Sachin Katti, Jeff Cohen, Dina Katabi
CORR
2010
Springer
160views Education» more  CORR 2010»
15 years 4 months ago
An LSB Data Hiding Technique Using Natural Numbers
In this paper, a novel data hiding technique is proposed, as an improvement over the Fibonacci LSB data-hiding technique proposed by Battisti et al. [1] based on decomposition of ...
Sandipan Dey, Ajith Abraham, Sugata Sanyal
TPDS
1998
78views more  TPDS 1998»
15 years 4 months ago
Resource Deadlocks and Performance of Wormhole Multicast Routing Algorithms
—We show that deadlocks due to dependencies on consumption channels are a fundamental problem in wormhole multicast routing. This type of resource deadlocks has not been addresse...
Rajendra V. Boppana, Suresh Chalasani, C. S. Ragha...
NOMS
2010
IEEE
147views Communications» more  NOMS 2010»
15 years 2 months ago
Distributed approaches to S-CSCF selection in an IMS network
—The IP Multimedia Subsystem (IMS) is a generic open-systems architecture offering converged multimedia services over IP. A function in the signaling plane of an IMS network is t...
Plarent Tirana, Deep Medhi
CORR
2011
Springer
156views Education» more  CORR 2011»
14 years 11 months ago
Extensional Collapse Situations I: non-termination and unrecoverable errors
Abstract. We consider a simple model of higher order, functional computations over the booleans. Then, we enrich the model in order to encompass non-termination and unrecoverable e...
Antonio Bucciarelli