Sciweavers

1336 search results - page 180 / 268
» SMTP Path Analysis
Sort
View
ICCNMC
2005
Springer
14 years 3 months ago
SAS: A Scalar Anonymous Communication System
Anonymity technologies have gained more and more attention for communication privacy. In general, users obtain anonymity at a certain cost in an anonymous communication system, whi...
Hongyun Xu, Xinwen Fu, Ye Zhu, Riccardo Bettati, J...
ICOIN
2005
Springer
14 years 3 months ago
A New Congestion Control Mechanism of TCP with Inline Network Measurement
In this paper, we propose a novel congestion control mechanism of TCP, by using an inline network measurement technique. By using information of available bandwidth of a network pa...
Tomohito Iguchi, Go Hasegawa, Masayuki Murata
IMA
2005
Springer
127views Cryptology» more  IMA 2005»
14 years 3 months ago
On the Automatic Construction of Indistinguishable Operations
Abstract. An increasingly important design constraint for software running on ubiquitous computing devices is security, particularly against physical methods such as side-channel a...
Manuel Barbosa, Dan Page
DOCENG
2004
ACM
14 years 3 months ago
Supervised learning for the legacy document conversion
We consider the problem of document conversion from the renderingoriented HTML markup into a semantic-oriented XML annotation defined by user-specific DTDs or XML Schema descrip...
Boris Chidlovskii, Jérôme Fuselier
EUROPAR
2004
Springer
14 years 3 months ago
Architecture-Independent Meta-optimization by Aggressive Tail Splitting
Several optimization techniques are hindered by uncertainties about the control flow in a program, which can generally not be determined by static methods at compile time. We pres...
Michael Rock, Andreas Koch