— Structured peer-to-peer systems have emerged as infrastructures for resource sharing in large-scale, distributed, and dynamic environments. One challenge in these systems is to...
Abstract. We introduce a novel remotely-mounted attack that can expose the network identity of an anonymous client, hidden service, and anonymizing proxies. To achieve this, we emp...
—Moving object detection is very important for video surveillance. In this paper, we present a new real time motion detection algorithm that is based on the integration of accumu...
Modulation forensics is to detect the modulation type in wireless communications without any prior information. It nds both military and civilian applications such as surveillance...
As distributed storage systems grow, the response time between detection and repair of the error becomes significant. Systems built on shared servers have additional complexity be...
Justin M. Wozniak, Paul Brenner, Douglas Thain, Aa...