Sciweavers

2478 search results - page 232 / 496
» Message from the Chair
Sort
View
WWW
2005
ACM
16 years 5 months ago
Enhancing the privacy of web-based communication
A profiling adversary is an adversary whose goal is to classify a population of users into categories according to messages they exchange. This adversary models the most common pr...
Aleksandra Korolova, Ayman Farahat, Philippe Golle
FOSSACS
2010
Springer
15 years 11 months ago
Parameterised Multiparty Session Types
For many application-level distributed protocols and parallel algorithms, the set of participants, the number of messages or the interaction structure are only known at run-time. T...
Nobuko Yoshida, Pierre-Malo Deniélou, Andi ...
ICC
2008
IEEE
140views Communications» more  ICC 2008»
15 years 11 months ago
Relay Selection in Dual-Hop Transmission Systems: Selection Strategies and Performance Results
— We address the problem of selecting an appropriate relay station for forwarding data from a source to a destination node in dual-hop communication systems. In this regard, we f...
Andreas Müller, Joachim Speidel
ICC
2007
IEEE
142views Communications» more  ICC 2007»
15 years 11 months ago
Filtering Spam Email Based on Retry Patterns
— A central problem in today’s Internet is unsolicited bulk email: spam. The SMTP protocol lacks a mechanism for verifying the source of a message, and respective protocol exte...
Peter Lieven, Björn Scheuermann, Michael Stin...
ICC
2007
IEEE
109views Communications» more  ICC 2007»
15 years 11 months ago
VoIP Performance in SIP-Based Vertical Handovers Between WLAN and GPRS/UMTS Networks
—This paper experimentally analyzes the handover performance of VoIP sessions in a wireless overlay of 802.11 WLANs and GPRS/UMTS networks when mobility is handled at the applica...
Marc Cardenete-Suriol, Josep Mangues-Bafalluy, Mar...