? Peer-to-peer is a popular distributed system. With the advancement in mobile technologies, mobile p2p has revealed its attraction. But, the resource constraints such as bandwidth...
Heart disease continues to be leading cause of morbidity and mortality among adults all over the world. Cardiac risk factor assessment requires a classification system that is rob...
The Classloader has long been one of the key extensibility points of the Java Virtual Machine architecture. It lies at the heart of many of the distributed mechanisms that have mad...
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
The new watermarking technique1 presented in this paper is an example of an asymmetric public detection scheme. The detection process does not need the original picture nor the sec...