Sciweavers

7475 search results - page 1419 / 1495
» Supporting use case based requirements engineering
Sort
View
NDSS
2009
IEEE
15 years 11 months ago
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows
Linking network flows is an important problem in intrusion detection as well as anonymity. Passive traffic analysis can link flows but requires long periods of observation to r...
Amir Houmansadr, Negar Kiyavash, Nikita Borisov
CIVR
2007
Springer
273views Image Analysis» more  CIVR 2007»
15 years 10 months ago
Scalable near identical image and shot detection
This paper proposes and compares two novel schemes for near duplicate image and video-shot detection. The first approach is based on global hierarchical colour histograms, using ...
Ondrej Chum, James Philbin, Michael Isard, Andrew ...
SASN
2006
ACM
15 years 10 months ago
RANBAR: RANSAC-based resilient aggregation in sensor networks
We present a novel outlier elimination technique designed for sensor networks. This technique is called RANBAR and it is based on the RANSAC (RANdom SAmple Consensus) paradigm, wh...
Levente Buttyán, Péter Schaffer, Ist...
MOBICOM
2005
ACM
15 years 10 months ago
Architecture and evaluation of an unplanned 802.11b mesh network
This paper evaluates the ability of a wireless mesh architecture to provide high performance Internet access while demanding little deployment planning or operational management. ...
John C. Bicket, Daniel Aguayo, Sanjit Biswas, Robe...
VLDB
1999
ACM
142views Database» more  VLDB 1999»
15 years 8 months ago
Active Storage Hierarchy, Database Systems and Applications - Socratic Exegesis
stract This panel addresses a very important area that is often neglected or overlooked by database systems, database applications developers and data warehouse designers, namely s...
Felipe Cariño, William O'Connell, John Burg...
« Prev « First page 1419 / 1495 Last » Next »