Sciweavers

2702 search results - page 383 / 541
» Message from the Editor
Sort
View
CORR
2007
Springer
117views Education» more  CORR 2007»
15 years 3 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
INTERNET
2006
156views more  INTERNET 2006»
15 years 3 months ago
Service Mosaic: A Model-Driven Framework for Web Services Life-Cycle Management
Web services provide abstractions for simplifying integration at lower levels of the interaction stacks, they don't yet help simplify integration at higher abstraction levels ...
Boualem Benatallah, Fabio Casati, Farouk Toumani, ...
JSAC
2008
79views more  JSAC 2008»
15 years 3 months ago
A content-centric framework for effective data dissemination in opportunistic networks
In this paper, we address the challenges of content transfer in opportunistic networks, and propose techniques to better facilitate data dissemination based on the characteristics ...
Ling-Jyh Chen, Chen-Hung Yu, Cheng-Long Tseng, Hao...
JPDC
2006
103views more  JPDC 2006»
15 years 3 months ago
Fractal: A mobile code-based framework for dynamic application protocol adaptation
The rapid growth of heterogeneous devices and diverse networks in our daily life, makes it is very difficult, if not impossible, to build a one-size-fits-all application or protoc...
Hanping Lufei, Weisong Shi
153
Voted
JPDC
2006
133views more  JPDC 2006»
15 years 3 months ago
Locality in structured peer-to-peer networks
Distributed hash tables (DHTs), used in a number of structured peer-to-peer (P2P) systems provide efficient mechanisms for resource placement and location. A key distinguishing fe...
Ronaldo A. Ferreira, Suresh Jagannathan, Ananth Gr...