Sciweavers

TPDS
2008
78views more  TPDS 2008»
13 years 4 months ago
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach
To detect and investigate self-propagating worm attacks against networked servers, the following capabilities are desirable: (1) raising timely alerts to trigger a worm investigat...
Xuxian Jiang, Florian P. Buchholz, Aaron Walters, ...
TPDS
2008
176views more  TPDS 2008»
13 years 4 months ago
Adaptive Data Collection Strategies for Lifetime-Constrained Wireless Sensor Networks
Communication is a primary source of energy consumption in wireless sensor networks. Due to resource constraints, the sensor nodes may not have enough energy to report every readin...
Xueyan Tang, Jianliang Xu
TPDS
2008
152views more  TPDS 2008»
13 years 4 months ago
Localization In Wireless Sensor Networks Based on Support Vector Machines
Abstract-- We consider the problem of estimating the geographic locations of nodes in a wireless sensor network where most sensors are without an effective self-positioning functio...
Duc A. Tran, Thinh Nguyen
TPDS
2008
87views more  TPDS 2008»
13 years 4 months ago
rStream: Resilient and Optimal Peer-to-Peer Streaming with Rateless Codes
Due to the lack of stability and reliability in peer-to-peer networks, multimedia streaming over peer-to-peer networks represents several fundamental engineering challenges. First...
Chuan Wu, Baochun Li
TPDS
2008
118views more  TPDS 2008»
13 years 4 months ago
Interaction of ISPs: Distributed Resource Allocation and Revenue Maximization
The Internet is a hierarchical architecture comprising heterogeneous entities of privately owned infrastructures, where higher level Internet service providers (ISPs) supply conne...
Sam C. M. Lee, Joe Wenjie Jiang, Dah-Ming Chiu, Jo...
TPDS
2008
67views more  TPDS 2008»
13 years 4 months ago
Embedding Long Paths in k-Ary n-Cubes with Faulty Nodes and Links
Let k 4 be even and let n 2. Consider a faulty k-ary n-cube Qk n in which the number of node faults fv and the number of link faults fe are such that fv +fe 2n-2. We prove that ...
Iain A. Stewart, Yonghong Xiang
TPDS
2008
231views more  TPDS 2008»
13 years 4 months ago
Anonymous Geo-Forwarding in MANETs through Location Cloaking
In this paper, we address the problem of destination anonymity for applications in mobile ad hoc networks where geographic information is ready for use in both ad hoc routing and I...
Xiaoxin Wu, Jun Liu, Xiaoyan Hong, Elisa Bertino
TPDS
2008
64views more  TPDS 2008»
13 years 4 months ago
Linear Programming-Based Affinity Scheduling of Independent Tasks on Heterogeneous Computing Systems
Abstract-- Resource management systems (RMS) are an important component in heterogeneous computing (HC) systems. One of the jobs of an RMS is the mapping of arriving tasks onto the...
Issam Al-Azzoni, Douglas G. Down
TPDS
2008
93views more  TPDS 2008»
13 years 4 months ago
Evaluating Dynamic Task Mapping in Network Processor Runtime Systems
Modern network processor systems require the ability to adapt their processing capabilities at runtime to changes in network traffic. Traditionally, network processor applications ...
Xin Huang, Tilman Wolf
TPDS
2008
133views more  TPDS 2008»
13 years 4 months ago
A More Practical Approach for Single-Packet IP Traceback using Packet Logging and Marking
Tracing IP packets back to their origins is an important step in defending the Internet against denial-of-service (DoS) attacks. Two kinds of IP traceback techniques have been prop...
Chao Gong, Kamil Saraç