Sciweavers

7766 search results - page 1287 / 1554
» Testing Nondeterminate Systems
Sort
View
IH
2005
Springer
15 years 6 months ago
Embedding Covert Channels into TCP/IP
It is commonly believed that steganography within TCP/IP is easily achieved by embedding data in header fields seemingly filled with “random” data, such as the IP identifier...
Steven J. Murdoch, Stephen Lewis
87
Voted
IJCNLP
2005
Springer
15 years 6 months ago
Web-Based Terminology Translation Mining
Mining terminology translation from a large amount of Web data can be applied in many fields such as reading/writing assistant, machine translation and cross-language information r...
Gaolin Fang, Hao Yu, Fumihito Nishino
109
Voted
ISPA
2005
Springer
15 years 6 months ago
Percentage Coverage Configuration in Wireless Sensor Networks
Abstract. Recent researches on energy efficient coverage configuration in wireless sensor networks mainly address the goal of 100% or near 100% coverage preserving. However, we fin...
Hongxing Bai, Xi Chen, Yu-Chi Ho, Xiaohong Guan
MATES
2005
Springer
15 years 6 months ago
Semantic Methods for P2P Query Routing
Knowledge sharing in a virtual organization requires a knowledge life cycle including knowledge provisioning, terminology alignment, determination of resource location, query routi...
Alexander Löser, Steffen Staab, Christoph Tem...
126
Voted
MHCI
2005
Springer
15 years 6 months ago
Searching common experience: a social communication tool based on mobile ad-hoc networking
As small digital cameras become more popular, opportunities to take photos are rapidly increasing. Photo sharing is a great way to maintain and revitalize relationships between fa...
Michimune Kohno, Jun Rekimoto
« Prev « First page 1287 / 1554 Last » Next »