The two most important aspects of any imagebased steganographic system are the imperceptibility and the capacity of the stego image. This paper evaluates the performance and effic...
Adel Almohammad, Gheorghita Ghinea, Robert M. Hier...
IP address lookup is one of the most important functionalities in the router design. To meet the requirements in high speed routers consisting of linecards with 40Gbps transfer ra...
Email worms continue to be a persistent problem, indicating that current approaches against this class of selfpropagating malicious code yield rather meagre results. Additionally,...
An opportunistic network is a type of challenged network that has attracted a great deal of attention in recent years. While a number of schemes have been proposed to facilitate d...
Networking infrastructure is a vital part of virtual computer clusters. This paper describes VirtCloud, a system for interconnecting virtual clusters in a state-wide network based...
David Antos, Ludek Matyska, Petr Holub, Jirí...
— For an application in public-resource computing environments, providing reliable scheduling based on resource reliability evaluation is becoming increasingly important. Most ex...
— The current internet infrastructure is facing a number of limitations that is not suitable to meet the growing number of services and users. In particular, one aspect that requ...
Sasitharan Balasubramaniam, Dmitri Botvich, Julien...
In this paper, we propose an efficient mechanism dealing with trust assessment for agent societies, aiming to accurately assess the trustworthiness of the collaborating agents. I...
—This paper deals with the traditional IP address lookup problem with fast updates. We propose a B-tree data structure, called MMSPT (Multiway Most Specific Prefix Tree), which i...
This paper is focused on modeling Web request and session level arrival processes. We propose a statistically rigorous approach which includes testing for non-stationarity and Gau...