• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 787
Next 10 →

Secure spread spectrum watermarking for multimedia

by Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, Talal Shamoon - IEEE TRANSACTIONS ON IMAGE PROCESSING , 1997
"... This paper presents a secure (tamper-resistant) algorithm for watermarking images, and a methodology for digital watermarking that may be generalized to audio, video, and multimedia data. We advocate that a watermark should be constructed as an independent and identically distributed (i.i.d.) Gauss ..."
Abstract - Cited by 1100 (10 self) - Add to MetaCart
. In these cases, the watermark detector unambiguously identifies the owner. Further, the use of Gaussian noise, ensures strong resilience to multiple-document, or collusional, attacks. Experimental results are provided to support these claims, along with an exposition of pending open problems.

Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs

by Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen , 2008
"... Key agreement is a fundamental security functionality by which pairs of nodes agree on shared keys to be used for protecting their pairwise communications. In this work we study key-agreement schemes that are well-suited for the mobile network environment. Specifically, we describe schemes with the ..."
Abstract - Cited by 6 (1 self) - Add to MetaCart
where intermediate nodes in the hierarchy can derive the secret keys for each of its children without any limitations or prior knowledge on the number of such children or their identities; • Resilient: the scheme is fully resilient against compromise of any number of leaves in the hierarchy, and of a

1 Strongly Resilient Non-Interactive Key Predistribution For Hierarchical Networks

by Hao Chen
"... ar ..."
Abstract - Add to MetaCart
Abstract not found

Robust distributed routing in dynamical networks – part II: Strong resilience, equilibrium selection and cascaded failures

by Giacomo Como, Ketan Savla, Daron Acemoglu, Munther A. Dahleh, Emilio Frazzoli - IEEE Trans. on Automatic Control , 2013
"... Abstract — We consider a dynamical formulation of network flows, whereby the network is modeled as a switched system of ordinary differential equations derived from mass conservation laws on directed graphs with a single origin-destination pair and a constant inflow at the origin. The rate of change ..."
Abstract - Cited by 7 (2 self) - Add to MetaCart
become inactive, and such node failures can propagate through the network due to rerouting of flow. We prove some properties of these dynamical networks and study the resilience of such networks under distributed routing policies with respect to perturbations that reduce link-wise flow functions

Strong Price of Anarchy

by Nir Andelman, Michal Feldman, Yishay Mansour
"... A strong equilibrium (Aumann 1959) is a pure Nash equilibrium which is resilient to deviations by coalitions. We define the strong price of anarchy to be the ratio of the worst case strong equilibrium to the social optimum. In contrast to the traditional price of anarchy, which quantifies the loss i ..."
Abstract - Cited by 73 (10 self) - Add to MetaCart
A strong equilibrium (Aumann 1959) is a pure Nash equilibrium which is resilient to deviations by coalitions. We define the strong price of anarchy to be the ratio of the worst case strong equilibrium to the social optimum. In contrast to the traditional price of anarchy, which quantifies the loss

Sybil-resilient online content voting

by Nguyen Tran, Bonan Min, Jinyang Li, Lakshminarayanan Subramanian - In Proceedings of the 6th Symposium on Networked System Design and Implementation (NSDI , 2009
"... Obtaining user opinion (using votes) is essential to ranking user-generated online content. However, any content voting system is susceptible to the Sybil attack where adversaries can out-vote real users by creating many Sybil identities. In this paper, we present SumUp, a Sybilresilient vote aggreg ..."
Abstract - Cited by 71 (5 self) - Add to MetaCart
trace of Digg, a popular news voting site, we have found strong evidence of attack on many articles marked “popular ” by Digg. 1

Resilience in the face of potential trauma

by George A. Bonanno - Current Directions in Psychological Science , 2005
"... ABSTRACT—Until recently, resilience among adults exposed to potentially traumatic events was thought to occur rarely and in either pathological or exceptionally healthy indi-viduals. Recent research indicates, however, that the most common reaction among adults exposed to such events is a relatively ..."
Abstract - Cited by 45 (4 self) - Add to MetaCart
ABSTRACT—Until recently, resilience among adults exposed to potentially traumatic events was thought to occur rarely and in either pathological or exceptionally healthy indi-viduals. Recent research indicates, however, that the most common reaction among adults exposed to such events is a

Control Plane Resilience: The Method of Strong Detection

by Raj Kumar Rajendran, Vishal Misra, Dan Rubenstein
"... Abstract — For the past several decades, work that develops and analyzes network routing protocols has assumed that each network node properly implements the algorithm that establishes routes through the network. However, there have been several instances in which a trivial misconfiguration in a sin ..."
Abstract - Add to MetaCart
behaviors of their misconfigured counterparts. In this paper, we describe our development of a general theory called Strong Detection that examines routing protocols in environments where some misconfigured routers “misbehave” and (intentionally or unintentionally) issue inaccurate reports that shift

Commentary Boston Strong: The Role of Community Resilience

by Barbara Ferrer, Med Lisa Conley
"... April marked the 1-year anniversary of the Boston MarathonBombings,which brought our city to a stand-still as we endured a terrorist attack, manhunt, and subsequent lockdown of the metropolitan area. Twin explosions near themarathon finish line, occurring just minutes apart, left 3 people dead and h ..."
Abstract - Add to MetaCart
April marked the 1-year anniversary of the Boston MarathonBombings,which brought our city to a stand-still as we endured a terrorist attack, manhunt, and subsequent lockdown of the metropolitan area. Twin explosions near themarathon finish line, occurring just minutes apart, left 3 people dead and hundreds in-jured. In the hour that followed the bombing, the city of Boston and privately run ambulance crews, with the aid of first responders, bystanders, and trained volun-teers, triaged and transported 118 patients to 9 differ-ent hospitals, including the city’s 7 major trauma cen-ters, preventing what could have been a much higher death toll. In the ensuing disorder, families were sepa-rated, belongings misplaced, and hundreds of runners stopped before they could finish the race.

Resilience at work

by Dr Josh Cameron , Professor Angie Hart , Professor Gaynor Sadlo
"... Abstract An ecological conceptualisation of resilience was one of the major orientating concepts for this doctoral research which used critical realist methodology to gain explanatory insight into the job retention challenges faced by employees recovering from mental health problems. Methods involv ..."
Abstract - Add to MetaCart
Abstract An ecological conceptualisation of resilience was one of the major orientating concepts for this doctoral research which used critical realist methodology to gain explanatory insight into the job retention challenges faced by employees recovering from mental health problems. Methods
Next 10 →
Results 1 - 10 of 787
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University