• Publications
  • Influence
Copyright protection for the electronic distribution of text documents
TLDR
Several mechanisms for marking documents and several other mechanisms for decoding the marks after documents have been subjected to common types of distortion are described and compared. Expand
Electronic marking and identification techniques to discourage document copying
TLDR
Three coding methods are proposed that discourage illicit distribution by embedding each document with a unique codeword, yet enable one to identify the sanctioned recipient of a document by examination of a recovered document. Expand
Document marking and identification using both line and word shifting
TLDR
A study of document marking to deter illicit dissemination reveals that the distortion on the photocopy of a document is very different in the vertical and horizontal directions, leading to the strategy that marks a text line both vertically using line shifting and horizontally using word shifting. Expand
Electronic Marking and Identification Techniques to Discourage Document Copying
TLDR
This paper proposes techniques that discourage unauthorized distribution by embedding each document with a unique codeword, and describes one in detail, and presents experimental results showing that the identification techniques are highly reliable, even after documents have been photocopied. Expand
Bounds on Maximum Delay in Networks with Deflection Routing
TLDR
New upper bounds on the evacuation time of batch admissions are derived, and bounds on worst case transit delay for certain networks admitting packets continuously are derived. Expand
Handheld routers: intelligent bandwidth aggregation for mobile collaborative communities
TLDR
The issues and tradeoffs faced in designing a decentralized inverse multiplexing system are identified, and precisely how heterogeneous WAN links should be characterized, and when they should be added to, or deleted from, the shared pool are determined. Expand
Content Services Network: The Architecture and Protocols
Content delivery networks (CDNs) can be viewed as application-specific overlay networks that make web caching an infrastructure service accessible to any content provider. As the Internet continuesExpand
Technical Challenges in Location-Aware Video Surveillance Privacy
  • Jack Brassil
  • Computer Science
  • Protecting Privacy in Video Surveillance
  • 2009
TLDR
The system – Cloak – seeks to discourage surveillers from distributing video without the authorization of the surveilled, and it is demonstrated how privacy can be enhanced while requiring no change to existing surveillance technology. Expand
Physical Layer Network Isolation in Multi-tenant Clouds
  • Jack Brassil
  • Computer Science
  • IEEE 30th International Conference on Distributed…
  • 21 June 2010
TLDR
This work introduces a novel application of distributed bridging based on Virtual Ethernet Port Aggregators and shows how improved client isolation can be realized with 'color gapping' using existing Coarse Wavelength Division Multiplexing technologies. Expand
Deflection routing in certain regular networks
Deflection routing is a novel, distributed, adaptive routing technique proposed for very high speed packet switched networks. In deflection routing contention for access to communication links isExpand
...
1
2
3
4
5
...