Sciweavers

459 search results - page 35 / 92
» Detecting Spam at the Network Level
Sort
View
LCN
2006
IEEE
14 years 1 months ago
Detecting Malicious Peers in Overlay Multicast Streaming
Overlay multicast streaming is built out of loosely coupled end-hosts (peers) that contribute resources to stream media to other peers. Peers, however, can be malicious. They may ...
Samarth Shetty, Patricio Galdames, Wallapak Tavana...
DSOM
2007
Springer
13 years 11 months ago
Bottleneck Detection Using Statistical Intervention Analysis
Abstract. The complexity of today's large-scale enterprise applications demands system administrators to monitor enormous amounts of metrics, and reconfigure their hardware as...
Simon Malkowski, Markus Hedwig, Jason Parekh, Calt...
IPSN
2003
Springer
14 years 25 days ago
Boundary Estimation in Sensor Networks: Theory and Methods
Sensor networks have emerged as a fundamentally new tool for monitoring spatially distributed phenomena. This paper investigates a strategy by which sensor nodes detect and estima...
Robert Nowak, Urbashi Mitra
SOCO
2011
Springer
13 years 2 months ago
Retransmission steganography and its detection
The paper presents a new steganographic method called RSTEG (retransmission steganography), which is intended for a broad class of protocols that utilises retransmission mechanisms...
Wojciech Mazurczyk, Milosz Smolarczyk, Krzysztof S...
FGR
2002
IEEE
140views Biometrics» more  FGR 2002»
14 years 18 days ago
Hierarchical Wavelet Networks for Facial Feature Localization
We present a technique for facial feature localization using a two-level hierarchical wavelet network. The first level wavelet network is used for face matching, and yields an af...
Rogério Schmidt Feris, Jim Gemmell, Kentaro...