Sciweavers

1291 search results - page 116 / 259
» Intrusion Detection for Distributed Applications
Sort
View
CCECE
2006
IEEE
14 years 3 months ago
A Modular Distributed Video Surveillance System Over IP
We present an automated and distributed real-time video surveillance system which can be used for the detection of objects and events in a wide range of applications. Video feeds ...
Drew Ostheimer, Sebastien Lemay, Mohammed Ghazal, ...
DATE
2010
IEEE
151views Hardware» more  DATE 2010»
14 years 2 months ago
A GPU based implementation of Center-Surround Distribution Distance for feature extraction and matching
The release of general purpose GPU programming environments has garnered universal access to computing performance that was once only available to super-computers. The availability...
Aditi Rathi, Michael DeBole, Weina Ge, Robert T. C...
PET
2012
Springer
11 years 11 months ago
Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams
We consider applications scenarios where an untrusted aggregator wishes to continually monitor the heavy-hitters across a set of distributed streams. Since each stream can contain ...
T.-H. Hubert Chan, Mingfei Li, Elaine Shi, Wenchan...
IPPS
2010
IEEE
13 years 6 months ago
A general algorithm for detecting faults under the comparison diagnosis model
We develop a widely applicable algorithm to solve the fault diagnosis problem in certain distributed-memory multiprocessor systems in which there are a limited number of faulty pr...
Iain A. Stewart
FCS
2006
13 years 10 months ago
Quantum Cryptographic Key Distribution Protocols
The application of the principles of quantum mechanics to cryptography has led to a respectable new dimension in confidential communication. As a result of these developments, it i...
Lelde Lace, Oksana Scegulnaja-Dubrovska, Ramuns Us...