Sciweavers

8468 search results - page 1474 / 1694
» The Technology of Data Stashing
Sort
View
SPRINGSIM
2007
15 years 3 days ago
Bringing knowledge to network defense
Security managers must scan through multiple continuous data streams issuing from diverse sources in an effort to defend computer networks from attack. However, manual aggregation...
Leigh Flagg, Gordon Streeter, Andrew Potter
WCE
2007
15 years 3 days ago
QoS-aware Multicast Ad hoc On-Demand Distance Vector Routing
—Ad hoc networking will become a major technology for wireless connectivity beside the multimedia necessity within the next few years. There are too many applications where one-t...
Vida Lashkari B. O., Mehdi Dehghan
ACCV
2009
Springer
15 years 2 days ago
Person De-identification in Videos
Advances in cameras and web technology have made it easy to capture and share large amounts of video data over to a large number of people. A large number of cameras oversee public...
Prachi Agrawal, P. J. Narayanan
ATAL
2009
Springer
15 years 2 days ago
Directing Status Messages to Their Audience in Online Communities
In this paper we present the results of our user study about status message sharing on the Social Web. The study revealed the privacy and information noise (sometimes originating f...
Milan Stankovic, Alexandre Passant, Philippe Laubl...
CIIA
2009
15 years 1 days ago
Sharing and Protecting Networked Digital Life Memories
The increasing power of computers, increasing capacity of digital memory and wider availability of a great variety of input devices such as cameras and video recorders, has resulte...
Madjid Merabti
« Prev « First page 1474 / 1694 Last » Next »