Sciweavers

42738 search results - page 8254 / 8548
» Search Computing Systems
Sort
View
PAM
2010
Springer
15 years 10 months ago
Toward Topology Dualism: Improving the Accuracy of AS Annotations for Routers
Abstract. To describe, analyze, and model the topological and structural characteristics of the Internet, researchers use Internet maps constructed at the router or autonomous syst...
Bradley Huffaker, Amogh Dhamdhere, Marina Fomenkov...
ACHI
2009
IEEE
15 years 10 months ago
From Isolation to Communication: A Case Study Evaluation of Robot Assisted Play for Children with Autism with a Minimally Expres
– The general context of the work presented in this paper is assistive robotics with our long-term aim to support children with autism. This paper is part of the Aurora project t...
Ben Robins, Kerstin Dautenhahn, Paul Dickerson
AINA
2009
IEEE
15 years 10 months ago
JPEG Steganography: A Performance Evaluation of Quantization Tables
The two most important aspects of any imagebased steganographic system are the imperceptibility and the capacity of the stego image. This paper evaluates the performance and effic...
Adel Almohammad, Gheorghita Ghinea, Robert M. Hier...
AP2PS
2009
IEEE
15 years 10 months ago
Detection of Encrypted Traffic in eDonkey Network through Application Signatures
—Peer-to-peer file sharing applications became very popular, being responsible for a large percentage of the network traffic. However, peer-to-peer traffic may compromise the per...
Mário M. Freire, David A. Carvalho, Manuela...
PERCOM
2009
ACM
15 years 10 months ago
BitHoc: A content sharing application for Wireless Ad hoc Networks
—As a result of the wide spread of new efficient mobile communication devices, users are more and more willing to find on these devices (PDAs, Smartphones, etc) applications si...
Amir Krifa, Mohamed Karim Sbai, Chadi Barakat, Thi...
« Prev « First page 8254 / 8548 Last » Next »