Sciweavers

2478 search results - page 404 / 496
» Message from the Chair
Sort
View
SIGCOMM
2010
ACM
15 years 1 months ago
SIP overload control: a backpressure-based approach
Overload happens in Session Initiation Protocol (SIP) networks when SIP servers have insufficient resources to handle all messages they receive. Under overload, SIP networks suffe...
Yaogong Wang
117
Voted
WISEC
2010
ACM
15 years 1 months ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...
95
Voted
AAMAS
2008
Springer
15 years 28 days ago
Autonomic communication services: a new challenge for software agents
The continuous growth in ubiquitous and mobile network connectivity, together with the increasing number of networked devices populating our everyday environments, call for a deep ...
Raffaele Quitadamo, Franco Zambonelli
92
Voted
AI
2008
Springer
15 years 28 days ago
Robust artificial life via artificial programmed death
We propose a novel approach to self-regenerating continuously-operating systems. Such systems provide best-case solutions in security surveillance or decision making centers. We i...
M. M. Olsen, N. Siegelmann-Danieli, Hava T. Siegel...
93
Voted
CGF
2008
100views more  CGF 2008»
15 years 27 days ago
Distortion-Free Steganography for Polygonal Meshes
We present a technique for steganography in polygonal meshes. Our method hides a message in the indexed representation of a mesh by permuting the order in which faces and vertices...
Alexander Bogomjakov, Craig Gotsman, Martin Isenbu...