Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness
暂无分享,去创建一个
[1] Jean Ponce,et al. Computer Vision: A Modern Approach , 2002 .
[2] Tieniu Tan,et al. A survey on visual surveillance of object motion and behaviors , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[3] Dorin Comaniciu,et al. Adaptive Resolution System for Distributed Surveillance , 2002, Real Time Imaging.
[4] Rita Cucchiara,et al. A multi‐camera vision system for fall detection and alarm generation , 2007, Expert Syst. J. Knowl. Eng..
[5] Rita Cucchiara,et al. Computer vision techniques for PDA accessibility of in-house video surveillance , 2003, IWVS '03.
[6] Daniel Stutzbach,et al. Improving Lookup Performance Over a Widely-Deployed DHT , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[7] Andrew J. Kornecki. Computing Curricula for the 21st Century , 2008, IEEE Distributed Systems Online.
[8] Akinori Yonezawa,et al. Software Security — Theories and Systems , 2003, Lecture Notes in Computer Science.
[9] Rita Cucchiara,et al. Detecting Moving Objects, Ghosts, and Shadows in Video Streams , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[10] Zehang Sun,et al. A distributed visual surveillance system , 2003, Proceedings of the IEEE Conference on Advanced Video and Signal Based Surveillance, 2003..
[11] Alfredo De Santis,et al. Towards a Lawfully Secure and Privacy Preserving Video Surveillance System , 2010, EC-Web.
[12] Thomas B. Moeslund,et al. A Survey of Computer Vision-Based Human Motion Capture , 2001, Comput. Vis. Image Underst..
[13] Umberto Ferraro Petrillo,et al. Engineering a secure mobile messaging framework , 2012, Comput. Secur..
[14] Ilsun You,et al. Secure and distributed video surveillance via portable devices , 2014, J. Ambient Intell. Humaniz. Comput..
[15] Mohammed Ghazal,et al. A Modular Distributed Video Surveillance System Over IP , 2006, 2006 Canadian Conference on Electrical and Computer Engineering.
[16] Peter Druschel,et al. Peer-to-peer systems , 2010, Commun. ACM.
[17] R. G. J. Wijnhoven,et al. Flexible surveillance system architecture for prototyping video content analysis algorithms , 2006, Electronic Imaging.
[18] Mubarak Shah,et al. KNIGHT/spl trade/: a real time surveillance system for multiple and non-overlapping cameras , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).
[19] Dan S. Wallach,et al. A Survey of Peer-to-Peer Security Issues , 2002, ISSS.
[20] Sergio A. Velastin,et al. Intelligent distributed surveillance systems: a review , 2005 .
[21] Shaogang Gong,et al. Visual Surveillance in a Dynamic and Uncertain World , 1995, Artif. Intell..
[22] Umberto Ferraro Petrillo,et al. An Extensible Framework for Efficient Secure SMS , 2010, 2010 International Conference on Complex, Intelligent and Software Intensive Systems.
[23] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[24] Guillaume Pierre,et al. A survey of DHT security techniques , 2011, CSUR.
[25] Yue-Shan Chang,et al. An Architecture for Video Surveillance Service Based on P2P and Cloud Computing , 2012, 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing.
[26] Blake Ramsdell,et al. S/MIME Version 3 Message Specification , 1999, RFC.
[27] Jim R. Parker,et al. Algorithms for image processing and computer vision , 1996 .
[28] Xavier Desurmont,et al. A general-purpose system for distributed surveillance and communication , 2006 .
[29] Yongdae Kim,et al. Attacking the Kad network , 2008, SecureComm.
[30] P. Silva,et al. Distributed Surveillance System , 2005, 2005 portuguese conference on artificial intelligence.
[31] Keith W. Ross,et al. Exploiting P2P systems for DDoS attacks , 2006, InfoScale '06.
[32] Gerald Quirchmayr,et al. Multidisciplinary Research and Practice for Information Systems , 2012, Lecture Notes in Computer Science.
[33] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[34] John Kubiatowicz,et al. Handling churn in a DHT , 2004 .
[35] Yakov Rekhter,et al. Dynamic Updates in the Domain Name System (DNS UPDATE) , 1997, RFC.
[36] A. Hampapur,et al. Smart video surveillance: exploring the concept of multiscale spatiotemporal tracking , 2005, IEEE Signal Processing Magazine.
[37] Alfredo De Santis,et al. Do You Trust Your Phone? , 2009, EC-Web.
[38] A Min Tjoa,et al. E-Commerce and Web Technologies , 2002, Lecture Notes in Computer Science.
[39] Ilsun You,et al. A Secure Distributed Video Surveillance System Based on Portable Devices , 2012, CD-ARES.