Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 229,898,560 papers from all fields of science
Search
Sign In
Create Free Account
Computer and network surveillance
Known as:
Cyber surveillance
, Digital surveillance
, Surveillance (disambiguation)
Expand
Computer and network surveillance is the monitoring of computer activity and data stored on a hard drive, or data being transferred over computer…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
37 relations
Avast SecureLine
Backdoor (computing)
Carnivore (software)
Cathode ray tube
Expand
Broader (1)
Computer forensics
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Robust Background Subtraction for Network Surveillance in H . 264 Streaming Video
Senior Member
2013
Corpus ID: 14135144
The H.264/Advanced Video Coding (AVC) is the industry standard in network surveillance owing to improved video quality, low…
Expand
2009
2009
Temporal and spatial air quality monitoring using internet surveillance camera and ALOS satellite image
C. Wong
,
M. MatJafri
,
K. Abdullah
,
H. S. Lim
IEEE Aerospace Conference
2009
Corpus ID: 23343598
Air pollution of fine particles with diameters less than 10 micrometers (PM10) is a major concern in many countries due to their…
Expand
2008
2008
Experiences from Two Sensor Network Deployments - Self-monitoring and Self-configuration Keys to Success
N. Finne
,
J. Eriksson
,
A. Dunkels
,
T. Voigt
Wired/Wireless Internet Communications
2008
Corpus ID: 14096228
Despite sensor network protocols being self-configuring, sensor network deployments continue to fail. We report our experience…
Expand
2007
2007
Implementation of a Labeling Algorithm based on Contour Tracing with Feature Extraction
H. Hedberg
,
F. Kristensen
,
V. Öwall
IEEE International Symposium on Circuits and…
2007
Corpus ID: 5818915
This paper describes an architecture of a connected-cluster labeling algorithm for binary images based on contour tracing with…
Expand
2006
2006
Youth, Governance and the City: Towards a Critical Urban Sociology of Youth Crime and Disorder Prevention
M. Bowden
2006
Corpus ID: 154681686
This article considers the historical and spatial context for the emergence of youth crime and disorder prevention initiatives in…
Expand
2004
2004
The IBM Smart Surveillance System
A. Hampapur
,
L. Brown
,
+6 authors
Ying-li Tian
2004
Corpus ID: 56531027
The increasing need for sophisticated surveillance systems and the move to digital surveillance infrastructure has transformed…
Expand
2003
2003
Adaptive shadow identification through automatic parameter estimation in video sequences
S. Tattersall
,
K. Dawson-Howe
2003
Corpus ID: 282982
This paper introduces a new algorithm for the discrimination of moving object and moving shadow pixels in video sequences. The…
Expand
2000
2000
Issues insufficiently resolved in Century 20 in the fault-tolerant distributed computing field
Kwang-rok Kim
Proceedings 19th IEEE Symposium on Reliable…
2000
Corpus ID: 15584779
As the 21st Century has just opened up, it is a fitting time to reflect on the evolution of the fault-tolerant distributed…
Expand
1996
1996
Reliability Testing of Rule-Based Systems
Alberto Avritzer
,
Johannes P. Ros
,
E. Weyuker
IEEE Software
1996
Corpus ID: 38750838
Rule-based software systems are becoming more common in industrial settings, particularly to monitor and control large, real-time…
Expand
1986
1986
Computer monitoring: Mismanagement by remote control
K. Nussbaum
,
V. duRivage
1986
Corpus ID: 167983486
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE