Sciweavers

2478 search results - page 404 / 496
» Message from the Chair
Sort
View
SIGCOMM
2010
ACM
13 years 10 months ago
SIP overload control: a backpressure-based approach
Overload happens in Session Initiation Protocol (SIP) networks when SIP servers have insufficient resources to handle all messages they receive. Under overload, SIP networks suffe...
Yaogong Wang
WISEC
2010
ACM
13 years 10 months ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...
AAMAS
2008
Springer
13 years 10 months ago
Autonomic communication services: a new challenge for software agents
The continuous growth in ubiquitous and mobile network connectivity, together with the increasing number of networked devices populating our everyday environments, call for a deep ...
Raffaele Quitadamo, Franco Zambonelli
AI
2008
Springer
13 years 10 months ago
Robust artificial life via artificial programmed death
We propose a novel approach to self-regenerating continuously-operating systems. Such systems provide best-case solutions in security surveillance or decision making centers. We i...
M. M. Olsen, N. Siegelmann-Danieli, Hava T. Siegel...
CGF
2008
100views more  CGF 2008»
13 years 10 months ago
Distortion-Free Steganography for Polygonal Meshes
We present a technique for steganography in polygonal meshes. Our method hides a message in the indexed representation of a mesh by permuting the order in which faces and vertices...
Alexander Bogomjakov, Craig Gotsman, Martin Isenbu...