Sciweavers

2068 search results - page 366 / 414
» Performance Analysis of a Distributed Wireless Access Scheme
Sort
View
CORR
2007
Springer
117views Education» more  CORR 2007»
14 years 10 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
IPPS
2005
IEEE
15 years 3 months ago
Stream PRAM
Parallel random access memory, or PRAM, is a now venerable model of parallel computation that that still retains its usefulness for the design and analysis of parallel algorithms....
Darrell R. Ulm, Michael Scherger
HPCN
1999
Springer
15 years 2 months ago
The Digital Puglia Project: An Active Digital Library of Remote Sensing Data
The growing need of software infrastructure able to create, maintain and ease the evolution of scientific data, promotes the development of digital libraries in order to provide th...
Giovanni Aloisio, Massimo Cafaro, Roy Williams
EDO
2000
Springer
15 years 1 months ago
Component Metadata for Software Engineering Tasks
Abstract. This paper presents a framework that lets a component developer provide a component user with different kinds of information, depending on the specific context and needs....
Alessandro Orso, Mary Jean Harrold, David S. Rosen...
DCOSS
2006
Springer
15 years 1 months ago
Efficient In-Network Processing Through Local Ad-Hoc Information Coalescence
We consider in-network processing via local message passing. The considered setting involves a set of sensors each of which can communicate with a subset of other sensors. There is...
Onur Savas, Murat Alanyali, Venkatesh Saligrama