Sciweavers

209 search results - page 3 / 42
» Effective Shadow Detection in Traffic Monitoring Application...
Sort
View
CVPR
2007
IEEE
14 years 7 months ago
Shadow Removal in Front Projection Environments Using Object Tracking
When an occluding object, such as a person, stands between a projector and a display surface, a shadow results. We can compensate by positioning multiple projectors so they produc...
Samuel Audet, Jeremy R. Cooperstock
CGO
2010
IEEE
13 years 9 months ago
Umbra: efficient and scalable memory shadowing
Shadow value tools use metadata to track properties of application data at the granularity of individual machine instructions. These tools provide effective means of monitoring an...
Qin Zhao, Derek Bruening, Saman P. Amarasinghe
AINA
2008
IEEE
13 years 7 months ago
Monitoring Network Traffic to Detect Stepping-Stone Intrusion
Most network intruders tend to use stepping-stones to attack or to invade other hosts to reduce the risks of being discovered. There have been many approaches that were proposed t...
Jianhua Yang, Byong Lee, Stephen S. H. Huang
ICDE
2005
IEEE
180views Database» more  ICDE 2005»
14 years 6 months ago
A Unified Framework for Monitoring Data Streams in Real Time
Online monitoring of data streams poses a challenge in many data-centric applications, such as telecommunications networks, traffic management, trend-related analysis, webclick st...
Ahmet Bulut, Ambuj K. Singh
ICMCS
2007
IEEE
138views Multimedia» more  ICMCS 2007»
13 years 11 months ago
Differentiated Service Protection of Multimedia Transmission via Detection of Traffic Anomalies
Multimedia transmission over the Internet has its quality of service (QoS) requirement. However, Denial-of-Service (DoS) attacks launch large volumes of traffic and consume networ...
Hongli Luo, Mei-Ling Shyu