As Internet services rapidly become an essential part of the global infrastructure, it is necessary for the protocols underlying these services to be robust and failsafe. To achiev...
Unsolicited bulk email (aka. spam) is a major problem on the Internet. To counter spam, several techniques, ranging from spam filters to mail protocol extensions like hashcash, hav...
Flavio D. Garcia, Jaap-Henk Hoepman, Jeroen van Ni...
We obtain analytically the delay per packet in a burst for the three burst aggregation algorithms: Time based, Burst Length based and mixed Time and Burst Length based, assuming r...
: Many effective watermarking algorithms have been proposed and implemented for digital images and digital video, however, few algorithms have been proposed for audio watermarking....
Because it is an integral part of the Internet routing apparatus, and because it allows multiple instances of the same service to be "naturally" discovered, IP Anycast h...
Hussein A. Alzoubi, Seungjoon Lee, Michael Rabinov...