Sciweavers

1036 search results - page 126 / 208
» Distributed Monitoring of Peer-to-Peer Systems
Sort
View
RAID
2007
Springer
14 years 3 months ago
Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems
We present a novel approach to remote traffic aggregation for Network Intrusion Detection Systems (NIDS) called Cooperative Selective Wormholing (CSW). Our approach works by select...
John R. Lange, Peter A. Dinda, Fabián E. Bu...
MOBICOM
2006
ACM
14 years 2 months ago
Wide area ocean networks: architecture and system design considerations
Wide area ocean networks for monitoring and scientific exploratory purposes are in various stages of design; smallscale networks are already in various stages of deployment and te...
Sumit Roy, Payman Arabshahi, Dan Rouseff, Warren L...
MM
2005
ACM
152views Multimedia» more  MM 2005»
14 years 2 months ago
A repeated video clip identification system
Identifying short repeated video clips, such as news program logo, station logo, TV commercials, etc., from broadcasting video databases or streams is important for video content ...
Xianfeng Yang, Ping Xue, Qi Tian
ESORICS
2008
Springer
13 years 10 months ago
A Framework for the Analysis of Mix-Based Steganographic File Systems
Abstract. The goal of Steganographic File Systems (SFSs) is to protect users from coercion attacks by providing plausible deniability on the existence of hidden files. We consider ...
Claudia Díaz, Carmela Troncoso, Bart Prenee...
CHI
2009
ACM
14 years 9 months ago
Supporting carers in their caring role through design
Carers are people who look after family, partners or friends who could not manage without them because of frailness, illness or disability. Our contribution is to show the potenti...
Andrea Taylor, Richard Wilson, Stefan Agamanolis