Sciweavers

123 search results - page 5 / 25
» Multiple Identities in BitTorrent Networks
Sort
View
SIGCOMM
2006
ACM
15 years 3 months ago
SybilGuard: defending against sybil attacks via social networks
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake ident...
Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, ...
EUROSSC
2006
Springer
15 years 1 months ago
Dynamic Bayesian Networks for Visual Surveillance with Distributed Cameras
Abstract. This paper presents a surveillance system for tracking multiple people through a wide area with sparsely distributed cameras. The computational core of the system is an a...
Wojciech Zajdel, Ali Taylan Cemgil, Ben J. A. Kr&o...
66
Voted
ACIVS
2006
Springer
15 years 3 months ago
Color-Based Multiple Agent Tracking for Wireless Image Sensor Networks
This paper presents an implementation of a color-based multiple agent tracking algorithm targeted for wireless image sensor networks. The proposed technique is based on employing l...
Emre Oto, Frances Lau, Hamid K. Aghajan
CORR
2007
Springer
135views Education» more  CORR 2007»
14 years 9 months ago
Multiple resolution of the modular structure of complex networks
Modular structure is ubiquitous in real-world complex networks. The detection of this type of organization into modules gives insights in the relationship between topological stru...
Alex Arenas, Alberto Fernández, Sergio G&oa...
77
Voted
COR
2004
111views more  COR 2004»
14 years 9 months ago
Multiple multicast tree allocation in IP network
The multicasting is defined as the distribution of the same information stream from one to many nodes concurrently. There has been an intensive research effort to design protocols...
Chae Y. Lee, Hee K. Cho