Sciweavers

2421 search results - page 392 / 485
» Message from the Co-Chairs
Sort
View
IH
2005
Springer
14 years 2 months ago
Embedding Covert Channels into TCP/IP
It is commonly believed that steganography within TCP/IP is easily achieved by embedding data in header fields seemingly filled with “random” data, such as the IP identifier...
Steven J. Murdoch, Stephen Lewis
KIVS
2005
Springer
14 years 2 months ago
Combining Service-Orientation and Peer-to-Peer Networks
: Almost all current P2P applications are built as monolithic systems: they tightly couple application software with an underlying P2P technology. For simple P2P applications like ...
Michael Conrad, Jochen Dinger, Hannes Hartenstein,...
MIDDLEWARE
2005
Springer
14 years 2 months ago
A reconfigurable group management middleware service for wireless sensor networks
Group management service plays a key role in wireless sensor networks (WSNs) as it provides support to high level middleware services such as object tracking, security, fault-tole...
Mardoqueu Vieira, Nelson Souto Rosa
CSCW
2004
ACM
14 years 2 months ago
Lilsys: Sensing Unavailability
As communications systems increasingly gather and propagate information about people’s reachability or “presence”, users need better tools to minimize undesired interruption...
James Begole, Nicholas E. Matsakis, John C. Tang
PADS
2004
ACM
14 years 2 months ago
Just-In-Time Cloning
In this work we focus on a new technique for making cloning of parallel simulations more efficient. Cloning provides a means for running multiple similar simulations in parallel ...
Maria Hybinette