Sciweavers

1616 search results - page 240 / 324
» networks 2002
Sort
View
NDSS
2002
IEEE
14 years 3 months ago
Detecting Steganographic Content on the Internet
Steganography is used to hide the occurrence of communication. Recent suggestions in US newspapers indicate that terrorists use steganography to communicate in secret with their a...
Niels Provos, Peter Honeyman
DSN
2002
IEEE
14 years 3 months ago
Generic Timing Fault Tolerance using a Timely Computing Base
Designing applications with timeliness requirements in environments of uncertain synchrony is known to be a difficult problem. In this paper, we follow the perspective of timing ...
Antonio Casimiro, Paulo Veríssimo
DSN
2002
IEEE
14 years 3 months ago
Process Modelling to Support Dependability Arguments
This paper reports work to support dependability arguments about the future reliability of a product before there is direct empirical evidence. We develop a method for estimating ...
Robin E. Bloomfield, Sofia Guerra
ICNP
2002
IEEE
14 years 3 months ago
Analysis of the MED Oscillation Problem in BGP
The Multi Exit Discriminator (MED) attribute of the Border Gateway Protocol (BGP) is widely used to implement “cold potato routing” between autonomous systems. However, the us...
Timothy Griffin, Gordon T. Wilfong
WMTE
2002
IEEE
14 years 2 months ago
KLeOS: A Personal, Mobile, Knowledge and Learning Organisation System
The design of a personal, mobile Knowledge and Learning Organisation System (KLeOS) is described. Studies of adult learning practice showed [1] that learning activity is mobile be...
Giasemi N. Vavoula, Mike Sharples