Search For:

Displaying 1-12 out of 12 total
Efficient Computation of Robust Average of Compressive Sensing Data in Wireless Sensor Networks in the Presence of Sensor Faults
Found in: IEEE Transactions on Parallel and Distributed Systems
By Chun Tung Chou,Aleksandar Ignjatovic,Wen Hu
Issue Date:August 2013
pp. 1525-1534
Wireless sensor networks (WSNs) enable the collection of physical measurements over a large geographic area. It is often the case that we are interested in computing and tracking the spatial-average of the sensor measurements over a region of the WSN. Unfo...
 
Iterative Security Risk Analysis for Network Flows Based on Provenance and Interdependency
Found in: 2013 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS)
By Mohsen Rezvani,Aleksandar Ignjatovic,Sanjay Jha
Issue Date:May 2013
pp. 286-288
Discovering high risk network flows and hosts in a high throughput network is a challenging task of network monitoring. Emerging complicated attack scenarios such as DDoS attacks increase the complexity of tracking malicious and high risk network activitie...
 
Model for Voter Scoring and Best Answer Selection in Community Q&A Services
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Chong Tong Lee, Eduarda Mendes Rodrigues, Gabriella Kazai, NataĊĦa Milic-Frayling, Aleksandar Ignjatovic
Issue Date:September 2009
pp. 116-123
Community Question Answering (cQA) services, such as Yahoo! Answers and MSN QnA, facilitate knowledge sharing through question answering by an online community of users. These services include incentive mechanisms to entice participation and self-regulate ...
 
An Analytic Approach to Reputation Ranking of Participants in Online Transactions
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Aleksandar Ignjatovic, Norman Foo, Chung Tong Lee
Issue Date:December 2008
pp. 587-590
Agents from a community interact in pairwise transactions across discrete time. Each agent reports its evaluation of another agent with which it has just had a transaction to a central system. This system uses these time-sequences of experience evaluations...
 
MUTE-AES: A multiprocessor architecture to prevent power analysis based side channel attack of the AES algorithm
Found in: Computer-Aided Design, International Conference on
By Jude Angelo Ambrose, Sri Parameswaran, Aleksandar Ignjatovic
Issue Date:November 2008
pp. 678-684
Side channel attack based upon the analysis of power traces is an effective way of obtaining the encryption key from secure processors. Power traces can be used to detect bitflips which betray the secure key. Balancing the bitflips with opposite bitflips h...
 
Anatomy of Differential Power Analysis for AES
Found in: Symbolic and Numeric Algorithms for Scientific Computing, International Symposium on
By Jude Angelo Ambrose, Naeill Aldon, Aleksandar Ignjatovic, Sri Parameswaran
Issue Date:September 2008
pp. 459-466
Side channel attacks are a significant threat to the deployment of secure embedded systems. Differential Power Analysis is
 
Application specific forwarding network and instruction encoding for multi-pipe ASIPs
Found in: Hardware/software codesign and system synthesis, International conference on
By Hui Guo, Sri Parameswaran, Aleksandar Ignjatovic, Swarnalatha Radhakrishnan
Issue Date:October 2006
pp. 241-246
Small area and code size are two critical design issues in most of embedded system designs. In this paper, we tackle these issues by customizing forwarding networks and instruction encoding schemes for multi-pipe Application Specific Instruction-Set Proces...
 
Trajectory Approximation for Resource Constrained Mobile Sensor Networks
Found in: 2014 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS)
By Ghulam Murtaza,Salil S. Kanhere,Aleksandar Ignjatovic,Raja Jurdak,Sanjay Jha
Issue Date:May 2014
pp. 59-66
Low-power compact sensor nodes are being increasingly used to collect trajectory data from moving objects such as wildlife. The size of this data can easily overwhelm the data storage available on these nodes. Moreover, the transmission of this extensive d...
 
A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks
Found in: Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems (SenSys '13)
By Aleksandar Ignjatovic, Elisa Bertino, Mohsen Rezvani, Sanjay Jha
Issue Date:November 2013
pp. 1-2
In this paper we introduce a novel sophisticated collusion attack scenario against a number of existing iterative filtering algorithms. To address this security issue, we propose an improvement for iterative filtering techniques by providing an initial app...
     
Instruction trace compression for rapid instruction cache simulation
Found in: Proceedings of the conference on Design, automation and test in Europe (DATE '07)
By Aleksandar Ignjatovic, Andhi Janapsatya, Joerg Henkel, Sri Parameswaran
Issue Date:April 2007
pp. 803-808
Modern Application Specific Instruction Set Processors (ASIPs) have customizable caches, where the size, associativity and line size can all be customized to suit a particular application. To find the best cache size suited for a particular embedded system...
     
Application specific forwarding network and instruction encoding for multi-pipe ASIPs
Found in: Proceedings of the 4th international conference on Hardware/software codesign and system synthesis (CODES+ISSS '06)
By Aleksandar Ignjatovic, Hui Guo, Sri Parameswaran, Swarnalatha Radhakrishnan
Issue Date:October 2006
pp. 241-246
Small area and code size are two critical design issues in most of embedded system designs. In this paper, we tackle these issues by customizing forwarding networks and instruction encoding schemes for multi-pipe Application Specific Instruction-Set Proces...
     
Finding optimal L1 cache configuration for embedded systems
Found in: Proceedings of the 2006 conference on Asia South Pacific design automation (ASP-DAC '06)
By Aleksandar Ignjatovic, Andhi Janapsatya, Sri Parameswaran
Issue Date:January 2006
pp. 796-801
Modern embedded system execute a single application or a class of applications repeatedly. A new emerging methodology of designing embedded system utilizes configurable processors where the cache size, associativity, and line size can be chosen by the desi...
     
 1