Sciweavers

1291 search results - page 127 / 259
» Intrusion Detection for Distributed Applications
Sort
View
VMV
2003
146views Visualization» more  VMV 2003»
13 years 10 months ago
ADB-Trees: Controlling the Error of Time-Critical Collision Detection
We present a novel framework for hierarchical collision detection that can be applied to virtually all bounding volume (BV) hierarchies. It allows an application to trade quality ...
Jan Klein, Gabriel Zachmann
MOBIHOC
2010
ACM
13 years 6 months ago
Detecting intra-room mobility with signal strength descriptors
We explore the problem of detecting whether a device has moved within a room. Our approach relies on comparing summaries of received signal strength measurements over time, which ...
Konstantinos Kleisouris, Bernhard Firner, Richard ...
ICIP
2004
IEEE
14 years 10 months ago
Steganalysis of quantization index modulation data hiding
Quantization index modulation (QIM) techniques have been gaining popularity in the data hiding community because of their robustness and information-theoretic optimality against a...
Kenneth Sullivan, Zhiqiang Bi, Upamanyu Madhow, Sh...
ICDCS
2006
IEEE
14 years 3 months ago
SysProf: Online Distributed Behavior Diagnosis through Fine-grain System Monitoring
Runtime monitoring is key to the effective management of enterprise and high performance applications. To deal with the complex behaviors of today’s multi-tier applications runn...
Sandip Agarwala, Karsten Schwan
ICDCSW
2007
IEEE
14 years 3 months ago
Automated Ensemble Extraction and Analysis of Acoustic Data Streams
This paper addresses the design and use of distributed pipelines for automated processing of sensor data streams. In particular, we focus on the detection and extraction of meanin...
Eric P. Kasten, Philip K. McKinley, Stuart H. Gage