Sciweavers

3116 search results - page 355 / 624
» Recovering
Sort
View
ICASSP
2009
IEEE
15 years 12 months ago
Multi-flow attack resistant watermarks for network flows
In this work we present a Multi-flow Attack Resistant Interval Centroid Based Watermarking (MAR-ICBW) scheme for network flows. Our proposed scheme can withstand the newly intro...
Amir Houmansadr, Negar Kiyavash, Nikita Borisov
ICASSP
2009
IEEE
15 years 12 months ago
Audio-assisted trajectory estimation in non-overlapping multi-camera networks
We present an algorithm to improve trajectory estimation in networks of non-overlapping cameras using audio measurements. The algorithm fuses audiovisual cues in each camera’s ï...
Murtaza Taj, Andrea Cavallaro
ICASSP
2009
IEEE
15 years 12 months ago
Unsupervised acoustic and language model training with small amounts of labelled data
We measure the effects of a weak language model, estimated from as little as 100k words of text, on unsupervised acoustic model training and then explore the best method of using ...
Scott Novotney, Richard M. Schwartz, Jeff Ma
ICC
2009
IEEE
158views Communications» more  ICC 2009»
15 years 12 months ago
An Energy-Aware Routing Protocol for Ad-Hoc Networks Based on the Foraging Behavior in Ant Swarms
—Routing in ad-hoc networks can consume considerable amount of battery power. However, as the nodes in these networks have limited power, routing is very much energy-constrained....
Sanjay Kumar Dhurandher, Sudip Misra, Mohammad S. ...
SAINT
2009
IEEE
15 years 12 months ago
Analyzing the Aftermath of the McColo Shutdown
This paper examines how spam behavior was impacted by the shutdown of McColo, a service provider known for its lax security enforcement. Since the shutdown, a variety of sources h...
Steve DiBenedetto, Daniel Massey, Christos Papadop...