Sciweavers

1291 search results - page 116 / 259
» Intrusion Detection for Distributed Applications
Sort
View
CCECE
2006
IEEE
15 years 8 months ago
A Modular Distributed Video Surveillance System Over IP
We present an automated and distributed real-time video surveillance system which can be used for the detection of objects and events in a wide range of applications. Video feeds ...
Drew Ostheimer, Sebastien Lemay, Mohammed Ghazal, ...
DATE
2010
IEEE
151views Hardware» more  DATE 2010»
15 years 7 months ago
A GPU based implementation of Center-Surround Distribution Distance for feature extraction and matching
The release of general purpose GPU programming environments has garnered universal access to computing performance that was once only available to super-computers. The availability...
Aditi Rathi, Michael DeBole, Weina Ge, Robert T. C...
PET
2012
Springer
13 years 4 months ago
Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams
We consider applications scenarios where an untrusted aggregator wishes to continually monitor the heavy-hitters across a set of distributed streams. Since each stream can contain ...
T.-H. Hubert Chan, Mingfei Li, Elaine Shi, Wenchan...
137
Voted
IPPS
2010
IEEE
15 years 10 days ago
A general algorithm for detecting faults under the comparison diagnosis model
We develop a widely applicable algorithm to solve the fault diagnosis problem in certain distributed-memory multiprocessor systems in which there are a limited number of faulty pr...
Iain A. Stewart
130
Voted
FCS
2006
15 years 3 months ago
Quantum Cryptographic Key Distribution Protocols
The application of the principles of quantum mechanics to cryptography has led to a respectable new dimension in confidential communication. As a result of these developments, it i...
Lelde Lace, Oksana Scegulnaja-Dubrovska, Ramuns Us...