Sciweavers

28 search results - page 3 / 6
» Surveillance Detection in High Bandwidth Environments
Sort
View
HICSS
2005
IEEE
170views Biometrics» more  HICSS 2005»
13 years 11 months ago
Low-Bandwidth Topology Maintenance for Robustness in Structured Overlay Networks
— Structured peer-to-peer systems have emerged as infrastructures for resource sharing in large-scale, distributed, and dynamic environments. One challenge in these systems is to...
Ali Ghodsi, Luc Onana Alima, Seif Haridi
ESORICS
2010
Springer
13 years 6 months ago
Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation
Abstract. We introduce a novel remotely-mounted attack that can expose the network identity of an anonymous client, hidden service, and anonymizing proxies. To achieve this, we emp...
Sambuddho Chakravarty, Angelos Stavrou, Angelos D....
WCE
2007
13 years 7 months ago
Motion Detection Based On Accumulative Optical Flow and Double Background Filtering
—Moving object detection is very important for video surveillance. In this paper, we present a new real time motion detection algorithm that is based on the integration of accumu...
Nan Lu, Jihong Wang, Li Yang, Q. Henry Wu
ICASSP
2008
IEEE
14 years 7 days ago
Modulation forensics for wireless digital communications
Modulation forensics is to detect the modulation type in wireless communications without any prior information. It nds both military and civilian applications such as surveillance...
W. Sabrina Lin, K. J. Ray Liu
FGCS
2008
102views more  FGCS 2008»
13 years 5 months ago
Making the best of a bad situation: Prioritized storage management in GEMS
As distributed storage systems grow, the response time between detection and repair of the error becomes significant. Systems built on shared servers have additional complexity be...
Justin M. Wozniak, Paul Brenner, Douglas Thain, Aa...