Sciweavers

309 search results - page 59 / 62
» Network Performance Anomaly Detection and Localization
Sort
View
ICDCS
2012
IEEE
12 years 12 months ago
FindingHuMo: Real-Time Tracking of Motion Trajectories from Anonymous Binary Sensing in Smart Environments
Abstract—In this paper we have proposed and designed FindingHuMo (Finding Human Motion), a real-time user tracking system for Smart Environments. FindingHuMo can perform device-f...
Debraj De, Wen-Zhan Song, Mingsen Xu, Cheng-Liang ...
MEDIAFORENSICS
2010
14 years 11 months ago
Forensic hash for multimedia information
Digital multimedia such as images and videos are prevalent on today's internet and cause significant social impact, which can be evidenced by the proliferation of social netw...
Wenjun Lu, Avinash L. Varna, Min Wu
SASO
2008
IEEE
15 years 3 months ago
A Robust Audit Mechanism to Prevent Malicious Behaviors in Multi-robot Systems
Market-based mechanisms can be used to coordinate self-interested multi-robot systems in fully distributed environments, where by self-interested we mean that each robot agent att...
MyungJoo Ham, Gul A. Agha
ACMSE
2004
ACM
15 years 2 months ago
A framework for trusted instruction execution via basic block signature verification
Most of today’s computers are connected to the Internet or at least to a local network, exposing system vulnerabilities to the potential attackers. One of the attackers’ goals...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
ICC
2008
IEEE
125views Communications» more  ICC 2008»
15 years 3 months ago
Combining Speak-Up with DefCOM for Improved DDoS Defense
—This work combines two existing defenses against distributed denial-of-service (DDoS) attacks DefCOM and Speak-up resulting in a synergistic improvement. DefCOM defense organize...
Mohit Mehta, Kanika Thapar, George C. Oikonomou, J...