Sciweavers

3103 search results - page 112 / 621
» Locating Features in Distributed Systems
Sort
View
132
Voted
ACSAC
2004
IEEE
15 years 7 months ago
Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis
1 A number of recent applications have been built on distributed hash tables (DHTs) based overlay networks. Almost all DHT-based schemes employ a tight deterministic data placement...
Mudhakar Srivatsa, Ling Liu
SECON
2010
IEEE
15 years 1 months ago
RDAS: Reputation-Based Resilient Data Aggregation in Sensor Network
Data aggregation in wireless sensor networks is vulnerable to security attacks and natural failures. A few nodes can drastically alter the result of the aggregation by reporting er...
Carlos R. Perez-Toro, Rajesh Krishna Panta, Saurab...
115
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Real time speaker localization and detection system for camera steering in multiparticipant videoconferencing environments
A real time speaker localization and detection system for videoconferencing environments is presented. In this system, a recently proposed modified Steered Response Power - Phase...
Amparo Marti, Maximo Cobos, José J. L&oacut...
IJNSEC
2008
72views more  IJNSEC 2008»
15 years 3 months ago
Bandwidth-Conserving Multicast VoIP Teleconference System
Teleconferencing is an essential feature in any business telephone system. A teleconference allows associates to engage in a group discussion by conducting a virtual meeting while...
Teck-Kuen Chua, David C. Pheanis
CISS
2008
IEEE
15 years 10 months ago
Cramer Rao bound on target localization estimation in MIMO radar systems
Abstract— This paper presents an analysis of target localization accuracy, attainable by the use of MIMO (MultipleInput Multiple-Output) radar systems, configured with multiple ...
Hana Godrich, Alexander M. Haimovich, Rick S. Blum