Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,398,463 papers from all fields of science
Search
Sign In
Create Free Account
Computer and network surveillance
Known as:
Cyber surveillance
, Digital surveillance
, Surveillance (disambiguation)
Expand
Computer and network surveillance is the monitoring of computer activity and data stored on a hard drive, or data being transferred over computer…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
37 relations
Avast SecureLine
Backdoor (computing)
Carnivore (software)
Cathode ray tube
Expand
Broader (1)
Computer forensics
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Robust Background Subtraction for Network Surveillance in H . 264 Streaming Video
Senior Member
2013
Corpus ID: 14135144
The H.264/Advanced Video Coding (AVC) is the industry standard in network surveillance owing to improved video quality, low…
Expand
Review
2013
Review
2013
Internet monitor 2014: reflections on the digital world
Urs Gasser
,
Jonathan Zittrain
,
Robert Faris
,
R. Jones
2013
Corpus ID: 88495118
This publication is the first annual report of the Internet Monitor project at the Berkman Center for Internet & Society at…
Expand
2008
2008
Experiences from Two Sensor Network Deployments - Self-monitoring and Self-configuration Keys to Success
N. Finne
,
J. Eriksson
,
A. Dunkels
,
T. Voigt
Wired/Wireless Internet Communications
2008
Corpus ID: 14096228
Despite sensor network protocols being self-configuring, sensor network deployments continue to fail. We report our experience…
Expand
2007
2007
Implementation of a Labeling Algorithm based on Contour Tracing with Feature Extraction
H. Hedberg
,
F. Kristensen
,
V. Öwall
IEEE International Symposium on Circuits and…
2007
Corpus ID: 5818915
This paper describes an architecture of a connected-cluster labeling algorithm for binary images based on contour tracing with…
Expand
2004
2004
The IBM Smart Surveillance System
A. Hampapur
,
L. Brown
,
+6 authors
Ying-li Tian
2004
Corpus ID: 56531027
The increasing need for sophisticated surveillance systems and the move to digital surveillance infrastructure has transformed…
Expand
2003
2003
Adaptive shadow identification through automatic parameter estimation in video sequences
S. Tattersall
,
K. Dawson-Howe
2003
Corpus ID: 282982
This paper introduces a new algorithm for the discrimination of moving object and moving shadow pixels in video sequences. The…
Expand
2000
2000
Issues insufficiently resolved in Century 20 in the fault-tolerant distributed computing field
Kwang-rok Kim
Proceedings 19th IEEE Symposium on Reliable…
2000
Corpus ID: 15584779
As the 21st Century has just opened up, it is a fitting time to reflect on the evolution of the fault-tolerant distributed…
Expand
1998
1998
Evaluation of In-vessel Composting of University Postconsumer Food Wastes
Darrell W. Donahue
,
J. A. Chalmers
,
J. A. Storey
1998
Corpus ID: 17899159
A prototype in-vessel composting unit, which includes air circulation and misting systems, was designed and built as a senior…
Expand
1996
1996
Reliability Testing of Rule-Based Systems
Alberto Avritzer
,
Johannes P. Ros
,
E. Weyuker
IEEE Software
1996
Corpus ID: 38750838
Rule-based software systems are becoming more common in industrial settings, particularly to monitor and control large, real-time…
Expand
1986
1986
Computer monitoring: Mismanagement by remote control
K. Nussbaum
,
V. duRivage
1986
Corpus ID: 167983486
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE