• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 351,976
Next 10 →

BIOTERRORISM: WHAT IS THE REAL THREAT?

by unknown authors , 2005
"... 1 ..."
Abstract - Add to MetaCart
Abstract not found

A threat in the air: How stereotypes shape intellectual identity and performance

by Claude M. Steele - American Psychologist , 1997
"... A general theory of domain identification is used to describe achievement barriers still faced by women in advanced quantitative areas and by African Americans in school. The theory assumes that sustained school success requires identification with school and its subdomains; that societal pressures ..."
Abstract - Cited by 639 (10 self) - Add to MetaCart
on these groups (e.g., economic disadvantage, gender roles) can frustrate this identification; and that in school domains where these groups are negatively stereotyped, those who have become domain identified face the further barrier of stereotype threat, the threat that others ' judgments or their own

Bro: A System for Detecting Network Intruders in Real-Time

by Vern Paxson , 1999
"... We describe Bro, a stand-alone system for detecting network intruders in real-time by passively monitoring a network link over which the intruder's traffic transits. We give an overview of the system's design, which emphasizes highspeed (FDDI-rate) monitoring, real-time notification, clear ..."
Abstract - Cited by 903 (41 self) - Add to MetaCart
We describe Bro, a stand-alone system for detecting network intruders in real-time by passively monitoring a network link over which the intruder's traffic transits. We give an overview of the system's design, which emphasizes highspeed (FDDI-rate) monitoring, real-time notification

The Sybil Attack

by John Douceur, Judith S. Donath , 2002
"... Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby unde ..."
Abstract - Cited by 1518 (1 self) - Add to MetaCart
Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby

Basic concepts and taxonomy of dependable and secure computing

by Algirdas Avizienis, Jean-claude Laprie, Brian Randell, Carl Landwehr - IEEE TDSC , 2004
"... This paper gives the main definitions relating to dependability, a generic concept including as special case such attributes as reliability, availability, safety, integrity, maintainability, etc. Security brings in concerns for confidentiality, in addition to availability and integrity. Basic defin ..."
Abstract - Cited by 758 (6 self) - Add to MetaCart
definitions are given first. They are then commented upon, and supplemented by additional definitions, which address the threats to dependability and security (faults, errors, failures), their attributes, and the means for their achievement (fault prevention, fault tolerance, fault removal, fault forecasting

The Theory of Economic Regulation

by George J. Stigler - The Bell Journal of Economics and Management Science , 1971
"... The potential usex of public resources and powers to improve the economic stuius of economic groups (such as industries and occupations) are analyzed to provide a scheme of the demand for regulation. The characteristics of the political process which allow relatively small groups to obtain such regu ..."
Abstract - Cited by 1057 (1 self) - Add to MetaCart
such regulation is then sketched lo provide elemenls of a theory of supply of regulation. A variety of empirical evidence and illustration is also presented. W The state—the machinery and power of the state—is a potential resource or threat to every industry in the society. With its power to prohibit or compel

Data Security

by Dorothy E. Denning, Peter J. Denning , 1979
"... The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest m the techmcal safeguards for data. There are four kinds of safeguards, each related to but distract from the others. Access controls regulate which users may enter the system and ..."
Abstract - Cited by 611 (3 self) - Add to MetaCart
The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest m the techmcal safeguards for data. There are four kinds of safeguards, each related to but distract from the others. Access controls regulate which users may enter the system

Self-discrepancy: A theory relating self and affect

by E. Tory Higgins - Psychological Review , 1987
"... This article presents a theory of how different types of discrepancies between self-state representa-tions are related to different kinds of emotional vulnerabilities. One domain of the self (actual; ideal; ought) and one standpoint on the self (own; significant other) constitute each type of self-s ..."
Abstract - Cited by 567 (7 self) - Add to MetaCart
with agitation-related emotions (e.g., fear, threat, restlessness). Differences in both the relative magnitude and the accessibility of individu-als ' available types of self-discrepancies are predicted to be related to differences in the kinds of discomfort people are likely to experience. Correlational

Bank Runs, Deposit Insurance, and Liquidity

by Douglas W. Diamond, Philip H. Dybvig - Journal of Political Economy , 2000
"... This article develops a model which shows that bank deposit contracts can provide allocations superior to those of exchange markets, offering an explanation of how banks subject to runs can attract deposits. Investors face privately observed risks which lead to a demand for liquidity. Traditional ..."
Abstract - Cited by 1178 (13 self) - Add to MetaCart
. Traditional demand deposit contracts which provide liquidity have multiple equilibria, one of which is a bank run. Bank runs in the model cause real economic damage, rather than simply reflecting other problems. Contracts which can prevent runs are studied, and the analysis shows

Cooperation and Punishment in Public Goods Experiments

by Ernst Fehr, Simon Gächter - AMERICAN ECONOMIC REVIEW , 2000
"... This paper provides evidence that free riders are heavily punished even if punishment is costly and does not provide any material benefits for the punisher. The more free riders negatively deviate from the group standard the more they are punished. As a consequence, the existence of an opportunity f ..."
Abstract - Cited by 485 (36 self) - Add to MetaCart
for costly punishment causes a large increase in cooperation levels because potential free riders face a credible threat. We show, in particular, that in the presence of a costly punishment opportunity almost complete cooperation can be achieved and maintained although, under the standard assumptions
Next 10 →
Results 1 - 10 of 351,976
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University