Sciweavers

2259 search results - page 125 / 452
» Separation and information hiding
Sort
View
INFOCOM
2010
IEEE
13 years 8 months ago
Routing Primitives for Wireless Mesh Networks: Design, Analysis and Experiments
—In this paper, we consider routing in multi-hop wireless mesh networks. We analyze three standardized and commonly deployed routing mechanisms that we term “nodepair discovery...
Stanislav Miskovic, Edward W. Knightly
MEDIAFORENSICS
2010
13 years 8 months ago
On the embedding capacity of DNA strands under substitution, insertion, and deletion mutations
A number of methods have been proposed over the last decade for embedding information within deoxyribonucleic acid (DNA). Since a DNA sequence is conceptually equivalent to a unid...
Félix Balado
MMMACNS
2010
Springer
13 years 8 months ago
Symptoms-Based Detection of Bot Processes
Botnets have become the most powerful tool for attackers to victimize countless users across cyberspace. Previous work on botnet detection has mainly focused on identifying infecte...
Jose Andre Morales, Erhan J. Kartaltepe, Shouhuai ...
SCL
2010
137views more  SCL 2010»
13 years 8 months ago
Cooperative distributed model predictive control
— Cooperative distributed model predictive control has recently been shown to provide stabilizing feedback for plants composed of any finite number of dynamically coupled subsys...
Brett T. Stewart, Aswin N. Venkat, James B. Rawlin...
EMNLP
2010
13 years 8 months ago
Practical Linguistic Steganography Using Contextual Synonym Substitution and Vertex Colour Coding
Linguistic Steganography is concerned with hiding information in natural language text. One of the major transformations used in Linguistic Steganography is synonym substitution. ...
Ching-Yun Chang, Stephen Clark