Sciweavers

2259 search results - page 145 / 452
» Separation and information hiding
Sort
View
NDSS
2002
IEEE
14 years 3 months ago
Detecting Steganographic Content on the Internet
Steganography is used to hide the occurrence of communication. Recent suggestions in US newspapers indicate that terrorists use steganography to communicate in secret with their a...
Niels Provos, Peter Honeyman
ICNP
1999
IEEE
14 years 2 months ago
Scaling End-to-End Multicast Transports with a Topologically-Sensitive Group Formation Protocol
While the IP unicast service has proven successful, extending end-to-end adaptation to multicast has been a difficult problem. Unlike the unicast case, multicast protocols must su...
Sylvia Ratnasamy, Steven McCanne
IPPS
1999
IEEE
14 years 2 months ago
Optimizing Irregular HPF Applications using Halos
This paper presents language features for High Performance Fortran HPF to specify non-local access patterns of distributed arrays, called halos, and to control the communication as...
Siegfried Benkner
CRYPTO
1998
Springer
105views Cryptology» more  CRYPTO 1998»
14 years 2 months ago
An Efficient Discrete Log Pseudo Random Generator
The exponentiation function in a finite field of order p (a prime number) is believed to be a one-way function. It is well known that O(log log p) bits are simultaneously hard for ...
Sarvar Patel, Ganapathy S. Sundaram
AMS
2007
Springer
229views Robotics» more  AMS 2007»
14 years 2 months ago
A Unified Robotic Software Architecture for Service Robotics and Networks of Smart Sensors
Abstract. This paper proposes a novel architecture for the programming of multi-modal service robots and networked sensors. The presented software framework eases the development o...
Daniel Westhoff, Jianwei Zhang