• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 487
Next 10 →

A Key-Management Scheme for Distributed Sensor Networks

by Laurent Eschenauer, Virgil D. Gligor - In Proceedings of the 9th ACM Conference on Computer and Communications Security , 2002
"... Distributed Sensor Networks (DSNs) are ad-hoc mobile networks that include sensor nodes with limited computation and communication capabilities. DSNs are dynamic in the sense that they allow addition and deletion of sensor nodes after deployment to grow the network or replace failing and unreliable ..."
Abstract - Cited by 919 (11 self) - Add to MetaCart
nodes. DSNs may be deployed in hostile areas where communication is monitored and nodes are subject to capture and surreptitious use by an adversary. Hence DSNs require cryptographic protection of communications, sensorcapture detection, key revocation and sensor disabling. In this paper, we present a

A Collaborative Search and Engage Strategy for Multiple Mobile Robots with Local Communication in Large-scale Hostile Area

by Xiaohui Cui, Rammohan K. Ragade, Adel S. Elmaghraby
"... scale This work considers the problem of using multiple small, lowcost robots, with a limited range of local communication ability, to collaboratively search and engage an indeterminate number of tasks in an unknown large-scale hostile area. In this paper, we provide an approach, which we refer to t ..."
Abstract - Add to MetaCart
scale This work considers the problem of using multiple small, lowcost robots, with a limited range of local communication ability, to collaboratively search and engage an indeterminate number of tasks in an unknown large-scale hostile area. In this paper, we provide an approach, which we refer

Iterative Game-theoretic Route Selection for Hostile Area Transit and Patrolling (Extended Abstract)

by Michal Jakob, Viliam Lisý, Branislav Bošanský, Michal Pěchouček
"... A number of real-world security scenarios can be cast as a problem of transiting an area patrolled by a mobile adversary, where the transiting agent aims to choose its route so as to minimize the probability of encountering the patrolling agent, and vice versa. We model this problem as a twoplayer z ..."
Abstract - Cited by 11 (4 self) - Add to MetaCart
A number of real-world security scenarios can be cast as a problem of transiting an area patrolled by a mobile adversary, where the transiting agent aims to choose its route so as to minimize the probability of encountering the patrolling agent, and vice versa. We model this problem as a twoplayer

The Coverage Problem in a Wireless Sensor Network

by Chi-fu Huang, Yu-chee Tseng , 2005
"... One of the fundamental issues in sensor networks is the coverage problem, which reflects how well a sensor network is monitored or tracked by sensors. In this paper, we formulate this problem as a decision problem, whose goal is to determine whether every point in the service area of the sensor ne ..."
Abstract - Cited by 292 (8 self) - Add to MetaCart
of some earlier results where only k = 1 is assumed. Applications of the result include determining insufficiently covered areas in a sensor network, enhancing fault-tolerant capability in hostile regions, and conserving energies of redundant sensors in a randomly deployed network. Our solutions can

Mobile Computations and Hostile Hosts

by Jan Vitek, Giuseppe Castagna , 1999
"... This paper scratches the surface of the problem of classifying the attacks that a mobile computation can be subjected to in an open network. The discussion is based on a simplified version of the Seal calculus. We show the impact of these attacks on the semantics of the calculus and on the notion ..."
Abstract - Cited by 17 (0 self) - Add to MetaCart
and on the notion of observational equivalence. 1 Introduction Wide area networks hold great promises in terms of distributed computing. Applications that scale to the size of the Internet and seamlessly provide access to massive amounts of information and value added services are now technically feasible

Hostile Media Effect

by Olga Doty, Jill Egeth Ph. D, Erika Falk Ph. D, Susan W. Morris, Ph. D , 2005
"... ii Hostile Media Effect This thesis investigated a new area in communication research—the hostile media effect (HME). HME is the tendency by partisans to perceive hostile bias in news coverage that appears evenhanded and objective to a neutral audience. This thesis argues that media consumers percei ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
ii Hostile Media Effect This thesis investigated a new area in communication research—the hostile media effect (HME). HME is the tendency by partisans to perceive hostile bias in news coverage that appears evenhanded and objective to a neutral audience. This thesis argues that media consumers

Hostility Inventory Matt

by The Buss Durkee, William Hale
"... Empirical research on anger and hostility has pervaded the academic literature for more than 50 years. Accurate measurement of anger/hostility and subse-quent interpretation of results requires that the instruments yield strong psy-chometric properties. For consistent measurement, reliability estima ..."
Abstract - Add to MetaCart
Empirical research on anger and hostility has pervaded the academic literature for more than 50 years. Accurate measurement of anger/hostility and subse-quent interpretation of results requires that the instruments yield strong psy-chometric properties. For consistent measurement, reliability

Testing with hostile data streams

by Alan A. Jorgensen - ACM SIGSOFT Software Engineering Notes, Volume 28, Issue , 2003
"... This note describes a method of testing software for response to malicious data streams. Systems that process data streams obtained from an external source such as the Internet are vulnerable to security issues if malicious data is not processed correctly. This note describes a testing method that c ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
to Adobe ® Acrobat® Reader ® version 5.0.1 provides a case study. The study applied 141,306 unique test cases and revealed 11 distinct indications of buffer overrun, numerous program lock-ups, and four steganographic possibilities. Research is on-going in the following areas: generalized buffer overrun

Biological Altruism in Hostile Environments1

by William Harms , 1999
"... Abstract: An agent-based computer model was used to investigate the effects of periodic local extinctions on the stabilization of cooperation in evolutionary prisoner’s dilemma. The model allows increasing population densities which tend to undermine standard non-discriminating “solutions. ” The res ..."
Abstract - Add to MetaCart
such communities from invasion. This suggests that geographical “edges of survivability ” may provide the conditions under which cooperation can emerge and discriminating mechanisms evolve. The evolution of economic altruism is one of the most vigorous areas of study at the intersection of biology, economics

International Peacebuilding: A Theoretical and Quantitative Analysis,”

by Michael W Doyle , The World Bank, DECRG Nicholas Sambanis - American Political Science Review , 2000
"... Abstract International peacebuilding can improve the prospects that a civil war will be resolved. Although peacebuilding strategies must be designed to address particular conflicts, broad parameters that fit most conflicts can be identified. Strategies should address the local roots of hostility; t ..."
Abstract - Cited by 164 (6 self) - Add to MetaCart
Abstract International peacebuilding can improve the prospects that a civil war will be resolved. Although peacebuilding strategies must be designed to address particular conflicts, broad parameters that fit most conflicts can be identified. Strategies should address the local roots of hostility
Next 10 →
Results 1 - 10 of 487
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University