Privacy protection of visual information is increasingly important as pervasive camera networks becomes more prevalent. The proposed scheme addresses the problem of preserving and...
Sen-Ching S. Cheung, Jithendra K. Paruchuri, Thinh...
This paper attempts to address the complexity of system administration by making the labor of applying software updates independent of the number of computers on which the softwar...
Constantine P. Sapuntzakis, David Brumley, Ramesh ...
Web applications can be classified as hybrids between hypermedia and information systems. They have a relatively simple distributed architecture from the user viewpoint, but a comp...
—Peer-to-peer file sharing applications became very popular, being responsible for a large percentage of the network traffic. However, peer-to-peer traffic may compromise the per...
Considerable research work has been done in the area of surveillance and biometrics, where the goals have always been high performance, robustness in security and cost optimizatio...