Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
video streaming
biblio
Optimal Cache Placement and Migration for Improving the Performance of Virtualized SAND
Submitted by grigby1 on Tue, 02/18/2020 - 11:55am
software controlled virtualized DASH environments
resilience
Resiliency
SAND
SAND architecture
Scalability
SDN
SDN controller
Servers
Software
software controlled virtualized approaches
quality of experience
standards
Streaming media
video streaming
virtualisation
virtualized caches
virtualized DANEs
virtualized SAND deployments
Web Caching
web-caches
end-users
adaptive video techniques
Bandwidth
cache location algorithm
cache migration algorithm
cache storage
DANE
DASH
DASH Aware Network Elements
dominant Internet applications
pubcrawl
good foundation
high QoE
HTTP
hypermedia
internet
Metrics
MPEG standard
optimal cache placement
optimal locations
biblio
Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach
Submitted by grigby1 on Mon, 02/10/2020 - 11:30am
secure socket layer
mobile radio
multiattribute associated fingerprints
multiple-attribute-based encrypted traffic classification
network management
pattern classification
Protocols
pubcrawl
resilience
Resiliency
Scalability
mobile network applications
security of data
Servers
SSL Trust Models
SSL/TLS
telecommunication security
telecommunication traffic
Training
Transport Layer Security
video streaming
encrypted protocol detection
application runtime
application-level traffic classification
attribute-lacking problem
certificate
classification guidance information
communication security
Correlation
Cryptographic Protocols
Cryptography
domain name
application data
Encrypted traffic classification
encrypted traffic classification methods
encrypted video stream classification
handshake certificates
Human behavior
Human Factors
MAAF
Markov processes
Metrics
biblio
Peer Based Tracking Using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection
Submitted by grigby1 on Thu, 01/02/2020 - 2:41pm
pubcrawl
network analytics tools
Network Behavioural detection
network traffic analysis
network traffic behaviour
Next generation firewall
next generation firewalls
packet content
peer based tracking
Peer-to-peer computing
privacy
Protocols
multituple indexing
Scalability
single tuple flow types
standard IDS systems
standards
TCP/IP fields
telecommunication traffic
traditional firewalls
transport protocols
video streaming
Zeus botnet
Intrusion Detection Systems
botnet
command and control systems
computer network security
Data Streaming
expert system rule set
expert systems
flow connection concept
generated metadata
Human Factors
Indexes
Internet of Things
5-tuple flow tables
invasive software
IoT devices
IP networks
malicious behaviours
malicious network threats
malware
malware detection
meta data
multipeered ZeuS botnet
multiple 5 tuple communications
biblio
Zynq FPGA Based System Design for Video Surveillance with Sobel Edge Detection
Submitted by aekwall on Mon, 08/12/2019 - 9:46am
Surveillance systems and ARM processor
learning (artificial intelligence)
live traffic analysis
Metrics
pubcrawl
Reconfigurability
Resiliency
Scalability
security
Sobel edge detection
Streaming media
surveillance
input composite video surveillance
Thermal Imaging
VGA
video coding
video interface
video streaming
video surveillance
Xilinx ZC702 platfor
ZC702
Zynq FPGA based system design
Zynq-7000
field programmable gate arrays
analog composite video interface
analog CVBS
camera
Cameras
computer architecture
computer vision
Decoding
deep learning
deep video
edge detection
edge detection filter
ADAS
FPGA
Hardware
HDMI-MIPI CSI
high speed serial interfaces
image classification
Image edge detection
image filtering
Image resolution
industrial automation
input composite video decoding
biblio
Incremental knowledge acquisition and self-learning for autonomous video surveillance
Submitted by K_Hooper on Wed, 04/04/2018 - 9:56am
unlabeled video streams
knowledge acquisition
object detection
pubcrawl
Resiliency
safety purpose
Scalability
self-learning
Self-Organizing Maps
standard machine learning pipelines
Intelligent Video Analysis
Unsupervised Learning
unsupervised machine learning
video feed
video frame
video signal processing
video stream
video streaming
video surveillance
video surveillance systems
Hazards
Anomaly Detection
autonomous video surveillance
benchmark video dataset
Change detection
Clustering algorithms
cognition
event detection
feature extraction
hazard detection
action recognition
Heuristic algorithms
Human behavior
imperative security
incremental knowledge acquisition
incremental learning
incremental machine learning
Industry 4.0
industry/smart factory settings
intelligent high-level video analysis
biblio
Side-channel information leakage of encrypted video stream in video surveillance systems
Submitted by grigby1 on Mon, 11/20/2017 - 12:05pm
pubcrawl
video surveillance systems
video surveillance
video streaming
video encoding standards
video coding
user basic activities
traffic size data
Streaming media
side-channel information leakage
Resiliency
residual image
Redundancy
Cameras
off-the-shelf cameras
Metrics
Image coding
Human Factors
Human behavior
home security
HIPAA regulations
encrypted video stream traffic patterns
encoding
data compression
Cryptography
biblio
Measuring Video QoE from Encrypted Traffic
Submitted by grigby1 on Thu, 05/18/2017 - 3:09pm
encryption
Measurement
Metrics
network measurements
privacy models
privacy models and measurement
pubcrawl
qoe
video streaming
biblio
"Video Streaming Using Dual-Channel Dual-Path Routing to Prevent Packet Copy Attack"
Submitted by grigby1 on Tue, 02/14/2017 - 12:40pm
transport layer
packet copy attack prevention
pubcrawl170102
receiver side
Routing
Routing protocols
scrambled frame pixels
scrambling
sender side
optimistic refined approach
video buffer
video coding
video encryption
video merging
video reconstruction
video streaming
video transmission
Communications technology
network layer routing protocol
multiple unsecured hops
multi path
multi hop
MATLAB
malicious forwarding logic
IPTV
Image reconstruction
illegally copied video data
dual-channel dual-path routing
dual channel
Cryptography
Conferences
computer network security
computational intelligence
biblio
A hybrid lossless and lossy compression scheme for streaming RGB-D data in real time
Submitted by BrandonB on Tue, 05/05/2015 - 12:39pm
streaming
red-green-blue-depth data
rescue robots
response robot
RGB images
RGB-D cameras
RGB-D data streaming
robot vision
robots
Servers
point cloud
tethers
Three-dimensional displays
urban search and rescue
USAR
USAR operations
video
video streaming
Wireless communication
wireless radio
disaster environment
3D depth data capture
aerial robots
aerospace robotics
Cameras
Compression
Computers
computing power requirements
data compression
data throughput
3D
Hardware
Image coding
image colour analysis
live streaming
lossless compression scheme
lossy compression scheme
low-power embedded computing equipment
Microsoft Kinect
mobile robots
biblio
In-Network Compute Extensions for Rate-Adaptive Content Delivery in Mobile Networks
Submitted by BrandonB on Tue, 05/05/2015 - 9:50am
rate adaptation
Mobility First project
mobility management (mobile radio)
network protocols
non-IP protocols
offloading work
pluggable compute-layer services
programmable nodes
protocol extensions
Protocols
Mobility
rate-adaptive content delivery
Servers
service providers
service-API extensions
Streaming media
trustworthiness
video streaming
video streams
video transcoding
in-network computing
Bit rate
clean slate enhancements
cloud
compute-layer extensions
computer architecture
context-awareness
data plane
en-route service-adaptation
GENI test bed
at-scale mobility
in-network services
internet
Internet architecture
Mobile communication
mobile computing
mobile devices
mobile end-user experience
mobile wireless networks
« first
‹ previous
1
2
3
next ›
last »