Sciweavers

2419 search results - page 343 / 484
» Modeling Spatio-temporal Network Computations: A Summary of ...
Sort
View
ICDCS
2005
IEEE
14 years 2 months ago
Enhancing Source-Location Privacy in Sensor Network Routing
— One of the most notable challenges threatening the successful deployment of sensor systems is privacy. Although many privacy-related issues can be addressed by security mechani...
Pandurang Kamat, Yanyong Zhang, Wade Trappe, Celal...
NDSS
2009
IEEE
14 years 4 months ago
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows
Linking network flows is an important problem in intrusion detection as well as anonymity. Passive traffic analysis can link flows but requires long periods of observation to r...
Amir Houmansadr, Negar Kiyavash, Nikita Borisov
CVPR
2009
IEEE
15 years 4 months ago
Stereo Matching with Nonparametric Smoothness Priors in Feature Space
We propose a novel formulation of stereo matching that considers each pixel as a feature vector. Under this view, matching two or more images can be cast as matching point clouds i...
Brandon M. Smith, Hailin Jin, Li Zhang
NDSS
2009
IEEE
14 years 4 months ago
Coordinated Scan Detection
Coordinated attacks, where the tasks involved in an attack are distributed amongst multiple sources, can be used by an adversary to obfuscate his incursion. In this paper we prese...
Carrie Gates
IWNAS
2008
IEEE
14 years 3 months ago
Adaptive Consistency Guarantees for Large-Scale Replicated Services
To maintain consistency, designers of replicated services have traditionally been forced to choose from either strong consistency guarantees or none at all. Realizing that a conti...
Yijun Lu, Ying Lu, Hong Jiang