Sciweavers

2421 search results - page 69 / 485
» Message from the Co-Chairs
Sort
View
IJNSEC
2007
161views more  IJNSEC 2007»
13 years 7 months ago
Data Hiding: Current Status and Key Issues
Image steganography is a covert communication method that uses an image as the cover to hide the truth from potential attackers that some secret message hidden in the image is bei...
Nan-I Wu, Min-Shiang Hwang
CORR
2010
Springer
151views Education» more  CORR 2010»
13 years 6 months ago
Adding a referee to an interconnection network: What can(not) be computed in one round
Abstract—In this paper we ask which properties of a distributed network can be computed from a few amount of local information provided by its nodes. The distributed model we con...
Florent Becker, Martín Matamala, Nicolas Ni...
INFOCOM
2010
IEEE
13 years 6 months ago
Retiring Replicants: Congestion Control for Intermittently-Connected Networks
Abstract—The widespread availability of mobile wireless devices offers growing opportunities for the formation of temporary networks with only intermittent connectivity. These in...
Nathanael Thompson, Samuel C. Nelson, Mehedi Bakht...
RULEML
2010
Springer
13 years 6 months ago
Photorealistic Semantic Web Service Groundings: Unifying RESTful and XML-RPC Groundings Using Rules, with an Application to Flic
Semantic Web services achieve effects in the world through Web services, so the mechanism connecting the ontological representations of services with the on-the-wire messages—th...
Dave Lambert, John Domingue
SIGSOFT
2010
ACM
13 years 5 months ago
Basset: a tool for systematic testing of actor programs
This paper presents Basset, a tool for systematic testing of JVM-based actor programs. The actor programming model offers a promising approach for developing reliable concurrent a...
Steven Lauterburg, Rajesh K. Karmani, Darko Marino...