Results 1 - 10
of
487
A Key-Management Scheme for Distributed Sensor Networks
- In Proceedings of the 9th ACM Conference on Computer and Communications Security
, 2002
"... Distributed Sensor Networks (DSNs) are ad-hoc mobile networks that include sensor nodes with limited computation and communication capabilities. DSNs are dynamic in the sense that they allow addition and deletion of sensor nodes after deployment to grow the network or replace failing and unreliable ..."
Abstract
-
Cited by 919 (11 self)
- Add to MetaCart
nodes. DSNs may be deployed in hostile areas where communication is monitored and nodes are subject to capture and surreptitious use by an adversary. Hence DSNs require cryptographic protection of communications, sensorcapture detection, key revocation and sensor disabling. In this paper, we present a
A Collaborative Search and Engage Strategy for Multiple Mobile Robots with Local Communication in Large-scale Hostile Area
"... scale This work considers the problem of using multiple small, lowcost robots, with a limited range of local communication ability, to collaboratively search and engage an indeterminate number of tasks in an unknown large-scale hostile area. In this paper, we provide an approach, which we refer to t ..."
Abstract
- Add to MetaCart
scale This work considers the problem of using multiple small, lowcost robots, with a limited range of local communication ability, to collaboratively search and engage an indeterminate number of tasks in an unknown large-scale hostile area. In this paper, we provide an approach, which we refer
Iterative Game-theoretic Route Selection for Hostile Area Transit and Patrolling (Extended Abstract)
"... A number of real-world security scenarios can be cast as a problem of transiting an area patrolled by a mobile adversary, where the transiting agent aims to choose its route so as to minimize the probability of encountering the patrolling agent, and vice versa. We model this problem as a twoplayer z ..."
Abstract
-
Cited by 11 (4 self)
- Add to MetaCart
A number of real-world security scenarios can be cast as a problem of transiting an area patrolled by a mobile adversary, where the transiting agent aims to choose its route so as to minimize the probability of encountering the patrolling agent, and vice versa. We model this problem as a twoplayer
The Coverage Problem in a Wireless Sensor Network
, 2005
"... One of the fundamental issues in sensor networks is the coverage problem, which reflects how well a sensor network is monitored or tracked by sensors. In this paper, we formulate this problem as a decision problem, whose goal is to determine whether every point in the service area of the sensor ne ..."
Abstract
-
Cited by 292 (8 self)
- Add to MetaCart
of some earlier results where only k = 1 is assumed. Applications of the result include determining insufficiently covered areas in a sensor network, enhancing fault-tolerant capability in hostile regions, and conserving energies of redundant sensors in a randomly deployed network. Our solutions can
Mobile Computations and Hostile Hosts
, 1999
"... This paper scratches the surface of the problem of classifying the attacks that a mobile computation can be subjected to in an open network. The discussion is based on a simplified version of the Seal calculus. We show the impact of these attacks on the semantics of the calculus and on the notion ..."
Abstract
-
Cited by 17 (0 self)
- Add to MetaCart
and on the notion of observational equivalence. 1 Introduction Wide area networks hold great promises in terms of distributed computing. Applications that scale to the size of the Internet and seamlessly provide access to massive amounts of information and value added services are now technically feasible
Hostile Media Effect
, 2005
"... ii Hostile Media Effect This thesis investigated a new area in communication research—the hostile media effect (HME). HME is the tendency by partisans to perceive hostile bias in news coverage that appears evenhanded and objective to a neutral audience. This thesis argues that media consumers percei ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
ii Hostile Media Effect This thesis investigated a new area in communication research—the hostile media effect (HME). HME is the tendency by partisans to perceive hostile bias in news coverage that appears evenhanded and objective to a neutral audience. This thesis argues that media consumers
Hostility Inventory Matt
"... Empirical research on anger and hostility has pervaded the academic literature for more than 50 years. Accurate measurement of anger/hostility and subse-quent interpretation of results requires that the instruments yield strong psy-chometric properties. For consistent measurement, reliability estima ..."
Abstract
- Add to MetaCart
Empirical research on anger and hostility has pervaded the academic literature for more than 50 years. Accurate measurement of anger/hostility and subse-quent interpretation of results requires that the instruments yield strong psy-chometric properties. For consistent measurement, reliability
Testing with hostile data streams
- ACM SIGSOFT Software Engineering Notes, Volume 28, Issue
, 2003
"... This note describes a method of testing software for response to malicious data streams. Systems that process data streams obtained from an external source such as the Internet are vulnerable to security issues if malicious data is not processed correctly. This note describes a testing method that c ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
to Adobe ® Acrobat® Reader ® version 5.0.1 provides a case study. The study applied 141,306 unique test cases and revealed 11 distinct indications of buffer overrun, numerous program lock-ups, and four steganographic possibilities. Research is on-going in the following areas: generalized buffer overrun
Biological Altruism in Hostile Environments1
, 1999
"... Abstract: An agent-based computer model was used to investigate the effects of periodic local extinctions on the stabilization of cooperation in evolutionary prisoner’s dilemma. The model allows increasing population densities which tend to undermine standard non-discriminating “solutions. ” The res ..."
Abstract
- Add to MetaCart
such communities from invasion. This suggests that geographical “edges of survivability ” may provide the conditions under which cooperation can emerge and discriminating mechanisms evolve. The evolution of economic altruism is one of the most vigorous areas of study at the intersection of biology, economics
International Peacebuilding: A Theoretical and Quantitative Analysis,”
- American Political Science Review
, 2000
"... Abstract International peacebuilding can improve the prospects that a civil war will be resolved. Although peacebuilding strategies must be designed to address particular conflicts, broad parameters that fit most conflicts can be identified. Strategies should address the local roots of hostility; t ..."
Abstract
-
Cited by 164 (6 self)
- Add to MetaCart
Abstract International peacebuilding can improve the prospects that a civil war will be resolved. Although peacebuilding strategies must be designed to address particular conflicts, broad parameters that fit most conflicts can be identified. Strategies should address the local roots of hostility
Results 1 - 10
of
487