Search
Now showing items 11-20 of 29
A Framework For Robust Detection And Prevention Of Wide-spread Node Compromise In Wireless Sensor Networks
(Computer Science & Engineering, 2010-07-19)
Wireless sensor networks are known to be vulnerable to a variety ofattacks that could undermine normal sensor network operations. Manyschemes have been developed to defend the wireless sensor networksagainst various attacks. ...
Real Time Hardware And Software Systems For Micro Air Vehicle Flight Control Testing
(Computer Science & Engineering, 2010-07-19)
The trend of increasing capabilities of micro scale electrical, mechanical, and computing systems is opening up the possibilities of new unmanned vehicle platforms. Both unmanned aerial and ground vehicles have traditionally ...
Mathematical Modeling For Phagocyte Transmigration And Reverse Engineering
(Computer Science & Engineering, 2010-11-01)
Computational modeling and simulation have been used as an important tool to analyze the behavior of a complex biology system. Typically, the biology system is a complex non-linear system where a large number of components ...
An Integrated Framework For QoS-aware Data Reporting In Wireless Sensor Networks
(Computer Science & Engineering, 2010-07-19)
Wireless sensor networks are being deployed in a wide variety of applications such as environment monitoring, smart buildings, security, machine surveillance system, and so on.The deployment of sensor networks for a specific ...
Information-driven Data Gathering In Wireless Sensor Networks
(Computer Science & Engineering, 2010-11-01)
Since the advance of wireless technology enables the mass production of low-cost, small-sized sensor nodes, sensor nodes can be densely deployed in an area for high tolerance to node failure or to achieve better coverage ...
Combating DoS Attacks In Wireless Networks Using Lightweight Key Mangement Schemes
(Computer Science & Engineering, 2010-11-01)
The unique features of wireless networks lead to many attractive applications in both military and civilian operations. Wireles networking devices usually use batteries as power supply, which requires all the operations ...
Peon: Privacy-enhanced Opportunistic Networks With Applications In Assistive Environments
(Computer Science & Engineering, 2010-07-19)
Opportunistic Networking holds a great deal of potential for making communications easier and more flexible in pervasive assistive environments. However, security and privacy must be addressed to make these communications ...
Selective Cross Correlation In Passive Timing Analysis Attacks Against Low-latency Mixes
(Computer Science & Engineering, 2010-07-19)
A mix is a communication proxy that hides the relationship between incoming and outgoing messages. Routing traffic through a path of mixes is a powerful tool for providing privacy. When mixes are used for interactive ...
Advanced Software Testing Techniques Based On Combinatorial Design
(Computer Science & Engineering, 2010-11-01)
Combinatorial testing refers to a testing strategy that applies the principles of combinatorial design to the domain of software test generation. Given a system with k parameters, combinatorial testing requires all the ...
A Novel Architecture For Mobility Enabled Video Conferencing In Next Generation Wireless Networks
(Computer Science & Engineering, 2010-11-01)
The Heterogeneous nature of next generation networks requires architecture and technologies that have an intrinsic support for diversity. The plethora of existing wireless access technologies will soon be connected to ...