Learn More
A common challenge in reconstructing phylogenies involves a high frequency of short internal branches, which makes basal relationships difficult to resolve. Often it is not clear whether this pattern results from insufficient or inappropriate data, versus from a rapid evolutionary radiation. The snapping shrimp genus Synalpheus, which contains in excess of(More)
As the most extreme expression of apparent altruism in nature, eusociality has long posed a central paradox for behavioral and evolutionary ecology. Because eusociality has arisen rarely among animals, understanding the selective pressures important in early stages of its evolution remains elusive. Employing a historical approach to this problem, we used(More)
Covert channels are a form of hidden communication that may violate the integrity of systems. Since their birth in multilevel security systems in the early 70’s they have evolved considerably, such that new solutions have appeared for computer networks mainly due to vague protocols specifications. We analyze a protocol extensively used today, the Dynamic(More)
The source-location privacy problem in Wireless Sensor Networks has been traditionally tackled by the creation of random routes for every packet transmitted from the source nodes to the base station. These schemes provide a considerable protection level at a high cost in terms of message delivery time and energy consumption. This overhead is due to the fact(More)
The singular communication model in wireless sensor networks (WSNs) originate pronounced traffic patterns that allow a local observer to deduce the location of the base station, which must be kept secret for both strategical and security reasons. In this work we present a new receiver-location privacy solution called HISP (Homogenous Injection for Sink(More)
Covert channels are a form of hidden communication that may violate the integrity of systems. Since their birth in Multi-Level Security systems in the early 70’s they have evolved considerably, such that new solutions have appeared for computer networks mainly due to vague protocols specifications. In this paper we concentrate on short-range covert channels(More)