Sciweavers

JUCS
2008
113views more  JUCS 2008»
13 years 4 months ago
Enhancing ZRTP by using Computational Puzzles
Abstract: In this paper we present and discuss a new approach for securing multimedia communication, which is based on three innovations. The first innovation is the integration of...
Helmut Hlavacs, Wilfried N. Gansterer, Hannes Scha...
JUCS
2008
158views more  JUCS 2008»
13 years 4 months ago
A Linear Time Approximation Algorithm for Ruler Folding Problem
: A chain or n-link is a sequence of n links whose lengths are fixed and are joined together from their endpoints, free to turn about their endpoints, which act as joints. "Ru...
Ali Nourollah, Mohammadreza Razzazi
JUCS
2008
166views more  JUCS 2008»
13 years 4 months ago
ASM Refinement Preserving Invariants
: This paper gives a definition of ASM refinement suitable for the verification that a protocol implements atomic transactions. We used this definition as the basis of the formal v...
Gerhard Schellhorn
JUCS
2008
100views more  JUCS 2008»
13 years 4 months ago
Stacked Dependency Networks for Layout Document Structuring
: We address the problems of structuring and annotation of layout-oriented documents. We model the annotation problems as the collective classification on graph-like structures wit...
Boris Chidlovskii, Loïc Lecerf
JUCS
2008
147views more  JUCS 2008»
13 years 4 months ago
Security and Usability Aspects of Man-in-the-Middle Attacks on ZRTP
Abstract: ZRTP is a protocol designed to set up a shared secret between two communication parties which is subsequently used to secure the media stream (i.e. the audio data) of a V...
Martin Petraschek, Thomas Hoeher, Oliver Jung, Hel...
JUCS
2008
138views more  JUCS 2008»
13 years 4 months ago
A New and Efficient Algorithm to Binarize Document Images Removing Back-to-Front Interference
: "Back-to-front interference", "bleeding" and "show-through" is the name given to the phenomenon found whenever documents are written on both sides o...
João Marcelo Monte da Silva, Rafael Dueire ...
JUCS
2008
104views more  JUCS 2008»
13 years 4 months ago
Socio-Economic Issues in Future Generation Internet
Markus Fiedler, Klaus D. Hackbarth, Helmut Hlavacs
JUCS
2008
120views more  JUCS 2008»
13 years 4 months ago
Guaranteeing Seamless Mobility with User Redials and Automatic Handover Retrials
: In communication systems that guarantee seamless mobility of users across service areas, repeated attempts occur as a result of user behavior but also as automatic retries of blo...
José Manuel Giménez-Guzmán, M...
JUCS
2008
144views more  JUCS 2008»
13 years 4 months ago
Embedded Software Revitalization through Component Mining and Software Product Line Techniques
: The mining of generic software components from legacy systems can be used as an auxiliary technique to revitalize systems. This paper presents a software maintenance approach tha...
Marcelo A. Ramos, Rosângela Dellosso Pentead...