Abstract— In this paper, detection of pedestrians using “subtraction stereo” is discussed. Subtraction stereo is a stereo vision method that focuses on the movement of object...
An increasing proportion of distributed hash tables (DHTs) maintain additional routing information regarding each node’s immediately surrounding neighbors in a network overlay. ...
Richard Price, Tien Tuan Anh Dinh, Georgios K. The...
Remote sensing applications are increasingly making use of sensors that generate demanding data flows (e.g. digital imaging devices). This paper presents the
The way people collaborate has been changed substantially. Team members are now belonging to different organizations, working on multiple objectives at the same time, frequently c...
Hong Linh Truong, Schahram Dustdar, Dino Baggio, S...
Tor (The Onion Routing) provides a secure mechanism for offering TCP-based services while concealing the hidden server’s IP address. In general the acceptance of services strong...
Karsten Loesing, Werner Sandmann, Christian Wilms,...
Interference ranges can dramatically affect the throughput in wireless sensor networks. While the transmission range defines the maximum physical range of a radio signal the inter...
In this paper, we propose a reputation-based trust model for P2P applications and study it a security framework. This framework makes it easy to reason about the resilience of the...
Object replication and cache consistency have been one of major design issues in the recent Internet applications. In this paper, we forcus on accuracy-aware applications (i.e., s...
In this paper we present an online algorithm that attacks the problem of placing relay nodes in regions where high localized congestion is detected. Congestion refers to the netwo...
In this paper an overview of novel scavenging approaches for almost autonomous ICT applications will be discussed and evaluated in terms of efficiency, integrability, cost and app...