Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2024
Raft Protocol for Fault Tolerance and Self-Recovery in Federated Learning
SEAMS '24: Proceedings of the 19th International Symposium on Software Engineering for Adaptive and Self-Managing SystemsPages 110–121https://doi.org/10.1145/3643915.3644093Federated Learning (FL) has emerged as a decentralised machine learning paradigm for distributed systems, particularly in edge and IoT environments. However, ensuring fault tolerance and self-recovery in such scenarios remains challenging, because of the ...
- invited-talkJuly 2015
The "Mobile Adversary" Paradigm in Distributed Computation and Systems
PODC '15: Proceedings of the 2015 ACM Symposium on Principles of Distributed ComputingPages 171–172https://doi.org/10.1145/2767386.2767453The notion of `mobile adversary,' where the opponent can capture parties in a multi-party protocol dynamically, as long as at any given point in time its capturing capability is limited by a bound on number of parties (processors) it can control, has ...
- research-articleJuly 2015
A Source-Channel Coding Approach to Digital Image Protection and Self-Recovery
IEEE Transactions on Image Processing (TIP), Volume 24, Issue 7Pages 2266–2277https://doi.org/10.1109/TIP.2015.2414878Watermarking algorithms have been widely applied to the field of image forensics recently. One of these very forensic applications is the protection of images against tampering. For this purpose, we need to design a watermarking algorithm fulfilling two ...
- research-articleSeptember 2014
Deployment and activation of faulty components at runtime for testing self-recovery mechanisms
ACM SIGAPP Applied Computing Review (SIGAPP), Volume 14, Issue 3Pages 44–54https://doi.org/10.1145/2670967.2670971The hypotheses on potential sources of error in an application can be specified in a fault model, which helps testing scenarios that are likely to be buggy. Based on a fault model, we developed custom fault detection mechanisms for providing self-...
- ArticleOctober 2011
Self-recovery fragile watermarking scheme with variable watermark payload
IWDW'11: Proceedings of the 10th international conference on Digital-Forensics and WatermarkingPages 142–155https://doi.org/10.1007/978-3-642-32205-1_13To take into account security, invisibility and recovery quality, this work proposes a variable-payload self-recovery fragile watermarking scheme. For each block, the watermarks include the total-watermark with variable number of bits and the basic-...
- ArticleJuly 2010
Fragile watermarking for color image recovery based on color filter array interpolation
WAIM'10: Proceedings of the 11th international conference on Web-age information managementPages 537–543In this paper, a novel fragile watermarking method is proposed for color image recovery via color filter array interpolation. First we turn a color image into a grey image by color sampling in the form of Bayer patterns. Data of the grey image which is ...
- ArticleDecember 2009
ABSR: An Agent Based Self-Recovery Model for Wireless Sensor Network
DASC '09: Proceedings of the 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure ComputingPages 400–404https://doi.org/10.1109/DASC.2009.97Wireless sensor networks (WSN) have become increasingly one of the most promising and interesting areas over the past few years. But the character of constrained resources makes it vulnerable to Denial of Service (DoS) attacks, resulting in a large ...
- ArticleSeptember 2009
Tamper detection and self-recovery algorithm of color image based on robust embedding of dual visual watermarks using DWT-SVD
ISCIT'09: Proceedings of the 9th international conference on Communications and information technologiesPages 157–162In this paper, we propose a scheme can be divided into two parts: one is about robust embedding of dual visual watermarks using DWT and Singular Value Decomposition (SVD), the other part is about tamper detection and self-recovery algorithm of color ...
- chapterSeptember 2009
Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization
In this paper, a self-recovery fragile watermarking scheme for image authentication is proposed to improve the performance of tamper detection and tamper recovery. The proposed scheme embeds the encrypted feature comprising 6-bit recovery data and 2-bit ...
- ArticleJuly 2009
Tamper Detection and Self-Recovery of Image Based on Self-Embedding
APCIP '09: Proceedings of the 2009 Asia-Pacific Conference on Information Processing - Volume 02Pages 76–79https://doi.org/10.1109/APCIP.2009.155This paper presents a novel image watermarking scheme for both tamper detection and tampered image recovery. The basic principle of this scheme is to compress per block of the original image using SPIHT (Set Partitioning in Hierarchical Trees), then ...
- ArticleApril 2009
A Self-Recovery Method Based on Mixed Reboot
ICAS '09: Proceedings of the 2009 Fifth International Conference on Autonomic and Autonomous SystemsPages 56–62https://doi.org/10.1109/ICAS.2009.18Microreboot is one of the most efficient self recovery technologies for mission-critical system. But some limitations still exist in the existing microreboot methods such as demand of componentization and loosing coupling etc. In order to eliminate ...
- ArticleJune 2006
Color Image Watermarking and Self-recovery Based on Independent Component Analysis
ICAISC '08: Proceedings of the 9th international conference on Artificial Intelligence and Soft ComputingPages 839–849https://doi.org/10.1007/978-3-540-69731-2_80The digital image watermarking field addresses the problem of digital image authentication and integrity. In this paper we propose a novel color image watermarking scheme based on image self-embedding and self-recovery techniques. The main idea of this ...
- research-articleFebruary 1996
Automatic Synthesis of Self-Recovering VLSI Systems
IEEE Transactions on Computers (ITCO), Volume 45, Issue 2Pages 131–142https://doi.org/10.1109/12.485368In this paper, we will describe an integrated system for synthesizing self-recovering microarchitectures called ${\cal SYNCERE}$. In the ${\cal SYNCERE}$model for self-recovery, transient faults are detected using duplication and comparison, while ...