Sciweavers

1291 search results - page 54 / 259
» Intrusion Detection for Distributed Applications
Sort
View
COMPSEC
2010
93views more  COMPSEC 2010»
15 years 18 days ago
Roving bugnet: Distributed surveillance threat and mitigation
Abstract Advanced mobile devices such as laptops and smartphones make convenient hiding places for surveillance spyware. They commonly have a microphone and camera built-in, are in...
Ryan Farley, Xinyuan Wang
77
Voted
IPPS
2007
IEEE
15 years 6 months ago
FixD : Fault Detection, Bug Reporting, and Recoverability for Distributed Applications
Model checking, logging, debugging, and checkpointing/recovery are great tools to identify bugs in small sequential programs. The direct application of these techniques to the dom...
Cristian Tapus, David A. Noblet
117
Voted
CLUSTER
2008
IEEE
15 years 7 months ago
Enabling lock-free concurrent fine-grain access to massive distributed data: Application to supernovae detection
—We consider the problem of efficiently managing massive data in a large-scale distributed environment. We consider data strings of size in the order of Terabytes, shared and ac...
Bogdan Nicolae, Gabriel Antoniu, Luc Bougé
135
Voted
DCOSS
2007
Springer
15 years 6 months ago
Separating the Wheat from the Chaff: Practical Anomaly Detection Schemes in Ecological Applications of Distributed Sensor Networ
Abstract. We develop a practical, distributed algorithm to detect events, identify measurement errors, and infer missing readings in ecological applications of wireless sensor netw...
Luís M. A. Bettencourt, Aric A. Hagberg, Le...
CVPR
2007
IEEE
16 years 2 months ago
Sensor noise modeling using the Skellam distribution: Application to the color edge detection
In this paper, we introduce the Skellam distribution as a sensor noise model for CCD or CMOS cameras. This is derived from the Poisson distribution of photons that determine the s...
Youngbae Hwang, Jun-Sik Kim, In-So Kweon