Sciweavers

1777 search results - page 333 / 356
» Surveillance Event Detection
Sort
View
WWW
2011
ACM
13 years 4 months ago
Truthy: mapping the spread of astroturf in microblog streams
Online social media are complementing and in some cases replacing person-to-person social interaction and redefining the diffusion of information. In particular, microblogs have ...
Jacob Ratkiewicz, Michael Conover, Mark Meiss, Bru...
INTERSPEECH
2010
13 years 3 months ago
Full body aero-tactile integration in speech perception
We follow up on our research demonstrating that aerotactile information can enhance or interfere with accurate auditory perception, even among uninformed and untrained perceivers ...
Donald Derrick, Bryan Gick
MOBILIGHT
2010
13 years 3 months ago
Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks
Node capture is considered as one of the most critical issues in the security of wireless sensor networks. A popular approach to thwart the problem relies on the detection of event...
Giacomo de Meulenaer, François-Xavier Stand...
TDSC
2010
146views more  TDSC 2010»
13 years 3 months ago
Fault Localization via Risk Modeling
Automated, rapid, and effective fault management is a central goal of large operational IP networks. Today's networks suffer from a wide and volatile set of failure modes, wh...
Ramana Rao Kompella, Jennifer Yates, Albert G. Gre...
TELSYS
2010
147views more  TELSYS 2010»
13 years 3 months ago
A new worm propagation threat in BitTorrent: modeling and analysis
Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting thes...
Sinan Hatahet, Abdelmadjid Bouabdallah, Yacine Cha...