Sciweavers

Share
JSAC
2006
128views more  JSAC 2006»
8 years 6 months ago
A framework for misuse detection in ad hoc networks- part II
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically stop functioning due to operational failu...
D. Subhadrabandhu, S. Sarkar, F. Anjum
JSAC
2006
165views more  JSAC 2006»
8 years 6 months ago
Image-Based Anomaly Detection Technique: Algorithm, Implementation and Effectiveness
The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. This paper presents NetViewer, a network measure...
Seong Soo Kim, A. L. Narasimha Reddy
JSAC
2006
81views more  JSAC 2006»
8 years 6 months ago
Wireless channel allocation using an auction algorithm
We develop a novel auction-based algorithm to allow users to fairly compete for a wireless fading channel. We use the second-price auction mechanism whereby user bids for the chan...
Jun Sun 0007, Eytan Modiano, Lizhong Zheng
JSAC
2006
181views more  JSAC 2006»
8 years 6 months ago
Information theoretic framework of trust modeling and evaluation for ad hoc networks
Abstract-- The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustwor...
Yan Lindsay Sun, Wei Yu, Zhu Han, K. J. Ray Liu
JSAC
2006
91views more  JSAC 2006»
8 years 6 months ago
Acquisition of direct-sequence transmitted reference ultra-wideband signals
In this paper, we investigate the timing acquisition problem for transmitted reference (TR) ultra-wideband systems employing direct-sequence (DS) spreading. We show that a two-leve...
Sandeep R. Aedudodla, Saravanan Vijayakumaran, Tan...
JSAC
2006
105views more  JSAC 2006»
8 years 6 months ago
StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense
Today's Internet hosts are threatened by large-scale Distributed Denial-of-Service (DDoS) attacks. The Path Identification (Pi) DDoS defense scheme has recently been proposed ...
Abraham Yaar, Adrian Perrig, Dawn Song
JSAC
2006
140views more  JSAC 2006»
8 years 6 months ago
Backup reprovisioning to remedy the effect of multiple link failures in WDM mesh networks
As networks grow in size and complexity, both the probability and the impact of failures increase. The pre-allocated backup bandwidth, which has been widely investigated in the lit...
Jing Zhang, Keyao Zhu, Biswanath Mukherjee
JSAC
2006
169views more  JSAC 2006»
8 years 6 months ago
A novel dynamic cell configuration scheme in next-generation situation-aware CDMA networks
- In next-generation CDMA networks, due to random user mobility and time-varying multimedia traffic activity, the system design of coverage and capacity is a challenging issue. To ...
Ching Yu Liao, Fei Yu, Victor C. M. Leung, Chung-J...
JSAC
2006
81views more  JSAC 2006»
8 years 6 months ago
Message from the Editor
V. Chan
JSAC
2006
200views more  JSAC 2006»
8 years 6 months ago
A simple Cooperative diversity method based on network path selection
Cooperative diversity has been recently proposed as a way to form virtual antenna arrays that provide dramatic gains in slow fading wireless environments. However, most of the prop...
Aggelos Bletsas, Ashish Khisti, David P. Reed, And...
books