Sciweavers

562 search results - page 76 / 113
» How to Optimize Residual Communications
Sort
View
ICC
2009
IEEE
13 years 6 months ago
Simulation of SPIT Filtering: Quantitative Evaluation of Parameter Tuning
A future where Internet Telephony will constitute a target valuable to attack is not so unrealistic. E-mail spam botnets software can be updated to send voice spam (commonly referr...
Federico Menna, Renato Lo Cigno, Saverio Niccolini...
ICC
2009
IEEE
150views Communications» more  ICC 2009»
13 years 6 months ago
Efficient Resource Discovery in Mobile Ad Hoc Networks
Abstract--The highly dynamic nature of infrastructureless adhoc networks poses new challenges during resource discovery. In this paper, we propose a novel algorithm for resource di...
Ravi Thanawala, Jie Wu, Avinash Srinivasan
TOG
2012
279views Communications» more  TOG 2012»
11 years 11 months ago
Sketch-based shape retrieval
We develop a system for 3D object retrieval based on sketched feature lines as input. For objective evaluation, we collect a large number of query sketches from human users that a...
Mathias Eitz, Ronald Richter, Tamy Boubekeur, Kris...
ICIP
2006
IEEE
14 years 10 months ago
Determining Achievable Rates for Secure, Zero Divergence, Steganography
In steganography (the hiding of data into innocuous covers for secret communication) it is difficult to estimate how much data can be hidden while still remaining undetectable. To...
Kenneth Sullivan, Kaushal Solanki, B. S. Manjunath...
ICECCS
2009
IEEE
119views Hardware» more  ICECCS 2009»
14 years 3 months ago
REMES: A Resource Model for Embedded Systems
In this paper, we introduce the model REMES for formal modeling and analysis of embedded resources such as storage, energy, communication, and computation. The model is a state-ma...
Cristina Cerschi Seceleanu, Aneta Vulgarakis, Paul...