Sciweavers

IPCCC
2007
IEEE
13 years 11 months ago
Understanding Localized-Scanning Worms
— Localized scanning is a simple technique used by attackers to search for vulnerable hosts. Localized scanning trades off between the local and the global search of vulnerable h...
Zesheng Chen, Chao Chen, Chuanyi Ji
IPCCC
2007
IEEE
13 years 11 months ago
A Model-Based Admission Control for 802.11e EDCA using Delay Predictions
- This paper presents a unique approach for a model-based admission control algorithm for the IEEE 802.11e Enhanced Distributed Channel Access (EDCA) standard. The analytical model...
A. Bai, Tor Skeie, Paal E. Engelstad
IPCCC
2007
IEEE
13 years 11 months ago
IMPACT - A Family of Cross-Layer Transmission Protocols for Wireless Sensor Networks
For economic reasons sensor networks are often implemented with resource constrained micro-controllers and low-end radio transceivers. Consequently, communication is inherently un...
Marcin Brzozowski, Reinhardt Karnapke, Jörg N...
IPCCC
2007
IEEE
13 years 11 months ago
A Hybrid Disk-Aware Spin-Down Algorithm with I/O Subsystem Support
To offset the significant power demands of hard disk drives in computer systems, drives are typically powered down during idle periods. This saves power, but accelerates duty cyc...
Timothy Bisson, Scott A. Brandt, Darrell D. E. Lon...
IPCCC
2007
IEEE
13 years 11 months ago
LoST: A Protocol for Mapping Geographic Locations to Public Safety Answering Points
Abstract— Public Safety Answering Points (PSAPs) serve limited geographic areas, so emergency callers must be directed to the most appropriate PSAP. As part of the overall Intern...
Henning Schulzrinne, Hannes Tschofenig, Andrew New...
IPCCC
2007
IEEE
13 years 11 months ago
Ensuring Performance in Activity-Based File Relocation
Dynamic Storage Tiering (DST) is the concept of grouping storage devices into tiers based on their characteristics, and relocating files dynamically to leverage on the heterogene...
Joel C. Wu, Bo Hong, Scott A. Brandt
IPCCC
2007
IEEE
13 years 11 months ago
Optimal Cluster Head Selection in the LEACH Architecture
LEACH (Low Energy Adaptive Clustering Hierarchy) [1] is one of the popular cluster-based structures, which has been widely proposed in wireless sensor networks. LEACH uses a TDMA ...
Haiming Yang, Biplab Sikdar
IPCCC
2007
IEEE
13 years 11 months ago
Towards Survivable and Secure Wireless Sensor Networks
– In this paper, we present a comprehensive study on the design of secure and survivable wireless sensor networks (WSNs). Our goal is to develop a framework that provides both se...
Yi Qian, Kejie Lu, David Tipper
IPCCC
2007
IEEE
13 years 11 months ago
Optimising Networks Against Malware
Rapidly-spreading malicious software is an important threat on today’s computer networks. Most solutions that have been proposed to counter this threat are based on our ability ...
Pierre-Marc Bureau, José M. Fernandez
IPCCC
2007
IEEE
13 years 11 months ago
A Power Management Proxy with a New Best-of-N Bloom Filter Design to Reduce False Positives
Miguel Jimeno, Kenneth J. Christensen, Allen Rogin...