Sciweavers

2474 search results - page 449 / 495
» Attacks on Steganographic Systems
Sort
View
GECCO
2008
Springer
167views Optimization» more  GECCO 2008»
15 years 27 days ago
Using coevolution to understand and validate game balance in continuous games
We attack the problem of game balancing by using a coevolutionary algorithm to explore the space of possible game strategies and counter strategies. We define balanced games as g...
Ryan E. Leigh, Justin Schonfeld, Sushil J. Louis
CCS
2010
ACM
15 years 1 days ago
Secure latency estimation with treeple
A network latency estimation scheme associates a "position" to every peer in a distributed network such that the latency between any two nodes can be accurately estimate...
Eric Chan-Tin, Nicholas Hopper
ADHOC
2007
133views more  ADHOC 2007»
14 years 12 months ago
Secure position-based routing protocol for mobile ad hoc networks
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
COMCOM
2008
91views more  COMCOM 2008»
14 years 12 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
CN
2006
107views more  CN 2006»
14 years 12 months ago
BGP session lifetime modeling in congested networks
The reliable Border Gateway Protocol (BGP) is essential for supporting high quality Internet data communication. In present Internet, due to the lack of differentiation mechanism ...
Li Xiao, Guanghui He, Klara Nahrstedt