Sciweavers

161 search results - page 29 / 33
» Transforming general networks into feed-forward by using tur...
Sort
View
MM
2006
ACM
197views Multimedia» more  MM 2006»
14 years 20 days ago
Virtual observers in a mobile surveillance system
Conventional wide-area video surveillance systems use a network of fixed cameras positioned close to locations of interest. We describe an alternative and flexible approach to w...
Stewart Greenhill, Svetha Venkatesh
CASES
2006
ACM
14 years 20 days ago
Automated compile-time and run-time techniques to increase usable memory in MMU-less embedded systems
Random access memory (RAM) is tightly-constrained in many embedded systems. This is especially true for the least expensive, lowest-power embedded systems, such as sensor network ...
Lan S. Bai, Lei Yang, Robert P. Dick
CCS
2004
ACM
14 years 3 days ago
Payload attribution via hierarchical bloom filters
Payload attribution is an important problem often encountered in network forensics. Given an excerpt of a payload, finding its source and destination is useful for many security ...
Kulesh Shanmugasundaram, Hervé Brönnim...
JNCA
2007
154views more  JNCA 2007»
13 years 6 months ago
Knowledge-based multimedia adaptation for ubiquitous multimedia consumption
Intelligent, server-side adaptation of multimedia resources is becoming increasingly important and challenging for two reasons. First, the market continuously brings up new mobile...
Dietmar Jannach, Klaus Leopold
COMPSEC
2008
111views more  COMPSEC 2008»
13 years 6 months ago
An ontology-based policy for deploying secure SIP-based VoIP services
-- Voice services over Internet Protocol (VoIP) are nowadays much promoted by telecommunication and Internet service providers. However, the utilization of open networks, like the ...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...