Sciweavers

2421 search results - page 128 / 485
» Message from the Co-Chairs
Sort
View
ADHOC
2008
72views more  ADHOC 2008»
13 years 9 months ago
MORA routing and capacity building in disruption-tolerant networks
Disruption-tolerant networks (DTNs) differ from other types of networks in that capacity is created by the movements of network participants. This implies that understanding and in...
Brendan Burns, Oliver Brock, Brian Neil Levine
CN
2002
89views more  CN 2002»
13 years 9 months ago
Graphic visualization and animation of LOTOS execution traces
Abstract. Two types of visualization and animation tools for LOTOS execution traces are presented: a translator from LOTOS traces to Message Sequence Charts and a graphic animator....
Bernard Stepien, Luigi Logrippo
CORR
2008
Springer
105views Education» more  CORR 2008»
13 years 8 months ago
Covert Channels in SIP for VoIP signalling
In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (V...
Wojciech Mazurczyk, Krzysztof Szczypiorski
TMC
2011
213views more  TMC 2011»
13 years 4 months ago
Expected Routing Overhead for Location Service in MANETs under Flat Geographic Routing
Abstract—We study routing overhead due to location information collection and retrieval in mobile ad-hoc networks employing geographic routing with no hierarchy. We first provid...
R. J. La, Eunyoung Seo
ARESEC
2011
104views more  ARESEC 2011»
12 years 9 months ago
An Inductive Approach to Provable Anonymity
—We formalise in a theorem prover the notion of provable anonymity proposed by Garcia et al. Our formalization relies on inductive definitions of message distinguish ability and...
Yongjian Li, Jun Pang