Sciweavers

108 search results - page 19 / 22
» Spreading Messages
Sort
View
ANCS
2007
ACM
15 years 1 months ago
High-speed detection of unsolicited bulk emails
We propose a Progressive Email Classifier (PEC) for highspeed classification of message patterns that are commonly associated with unsolicited bulk email (UNBE). PEC is designed t...
Sheng-Ya Lin, Cheng-Chung Tan, Jyh-Charn Liu, Mich...
GCC
2006
Springer
15 years 1 months ago
Hierarchical Replica Location Service Based on Hybrid Overlay Platform
An important problem that confronts data grid applications is to efficiently locate the node that stores a particular data replica. This paper proposes a Hierarchical Replica Loca...
Jianjin Jiang, Guangwen Yang, Yongwei Wu, Wusheng ...
NETWORKING
2010
14 years 11 months ago
Efficient Recovery from False State in Distributed Routing Algorithms
Abstract--Malicious and misconfigured nodes can inject incorrect state into a distributed system, which can then be propagated system-wide as a result of normal network operation. ...
Daniel Gyllstrom, Sudarshan Vasudevan, Jim Kurose,...
TIFS
2008
133views more  TIFS 2008»
14 years 9 months ago
Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding
Abstract-- It has recently been discovered that using pseudorandom sequences as carriers in spread-spectrum techniques for data-hiding is not at all a sufficient condition for ensu...
François Cayre, Patrick Bas
JSAC
2007
115views more  JSAC 2007»
14 years 9 months ago
Energy aware power allocation strategies for multihop-cooperative transmission schemes
Abstract— This paper deals with a cooperative decoded relaying scheme in multihop wireless network and the corresponding transmitters power allocation strategies for nodes belong...
Stefano Savazzi, Umberto Spagnolini