Sciweavers

438 search results - page 62 / 88
» The forest hiding problem
Sort
View
ICON
2007
IEEE
15 years 6 months ago
An Empirical Evaluation of IP Time To Live Covert Channels
—Communication is not necessarily made secure by the use of encryption alone. The mere existence of communication is often enough to raise suspicion and trigger investigative act...
Sebastian Zander, Grenville J. Armitage, Philip Br...
ATC
2007
Springer
15 years 6 months ago
Building Autonomic and Secure Service Oriented Architectures with MAWeS
Service-oriented architectures (SOA) and, in particular, Web Services designs are currently widely used for the development of open, large-scale interoperable systems. In those sys...
Valentina Casola, Emilio Pasquale Mancini, Nicola ...
CCS
2007
ACM
15 years 6 months ago
Preserving privacy in gps traces via uncertainty-aware path cloaking
Motivated by a probe-vehicle based automotive traffic monitoring system, this paper considers the problem of guaranteed anonymity in a dataset of location traces while maintainin...
Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabad...
MATES
2007
Springer
15 years 6 months ago
Goal-Oriented Interaction Protocols
Developing agent applications is a complex and difficult task due to a variety of reasons. One key aspect making multi-agent systems more complicated than traditional applications ...
Lars Braubach, Alexander Pokahr
MLDM
2007
Springer
15 years 6 months ago
Mining Frequent Trajectories of Moving Objects for Location Prediction
Advances in wireless and mobile technology flood us with amounts of moving object data that preclude all means of manual data processing. The volume of data gathered from position...
Mikolaj Morzy