Sciweavers

166 search results - page 23 / 34
» On the Feasibility of Bandwidth Detouring
Sort
View
AIPS
2009
13 years 8 months ago
A Decision-Theoretic Approach to Dynamic Sensor Selection in Camera Networks
Nowadays many urban areas have been equipped with networks of surveillance cameras, which can be used for automatic localization and tracking of people. However, given the large r...
Matthijs T. J. Spaan, Pedro U. Lima

Publication
96views
13 years 7 months ago
BotTorrent: Misusing BitTorrent to Launch DDoS Attacks
BitTorrent is currently one of the most popular peer-to-peer systems. BitTorrent clients are widely spread all over the world and account for a large fraction of today’s Internet...
Karim El Defrawy, Minas Gjoka, Athina Markopoulou
JSAC
2006
93views more  JSAC 2006»
13 years 7 months ago
A future radio-access framework
This paper discusses the requirements on future radio access and, based on the requirements, proposes a framework for such a system. The proposed system based on orthogonal frequen...
David Astely, Erik Dahlman, Pål K. Frenger, ...
TC
2008
13 years 7 months ago
High-Performance Designs for Linear Algebra Operations on Reconfigurable Hardware
Numerical linear algebra operations are key primitives in scientific computing. Performance optimizations of such operations have been extensively investigated. With the rapid adva...
Ling Zhuo, Viktor K. Prasanna
TIFS
2008
109views more  TIFS 2008»
13 years 7 months ago
Lookup-Table-Based Secure Client-Side Embedding for Spread-Spectrum Watermarks
Today, mass-scale electronic content distribution systems embed forensic tracking watermarks primarily at the distribution server. For limiting the bandwidth usage and server compl...
Mehmet Utku Celik, Aweke N. Lemma, Stefan Katzenbe...