Search For:

Displaying 1-8 out of 8 total
From DAML-S Processes to BPEL4WS
Found in: Research Issues in Data Engineering, International Workshop on
By Sisi Liu, Rania Khalaf, Francisco Curbera
Issue Date:March 2004
pp. 77-84
<p>BPEL4WS is a process modeling language for composing Web services. On the other hand, DAML-S is an ontology for de.ning Semantic Web services that includes a process model.</p> <p>We present a one-way mapping from the DAML-S process mo...
 
Time-Delayed Broadcasting for Defeating Inside Jammers
Found in: IEEE Transactions on Dependable and Secure Computing
By Sisi Liu,Loukas Lazos,Marwan Krunz
Issue Date:July 2014
pp. 1
We address the problem of jamming-resistant broadcast communications under an internal threat model. We propose a timedelayed broadcast scheme (TDBS), which implements the broadcast operation as a series of unicast transmissions distributed in frequency an...
 
A Study on the Features of Eye Movement Based on Different Types of Poetry Reading
Found in: 2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA)
By Hongzhi Yu,Guiping Chen,Sisi Liu
Issue Date:January 2013
pp. 195-199
This article acquisition the eye movement signal from the liberal arts students and college students of science and engineering, when they reading different style Chinese poetries which are writen in preqin, WeiJin, Tang, Song, the period of the republic a...
 
Cluster-Based Control Channel Allocation in Opportunistic Cognitive Radio Networks
Found in: IEEE Transactions on Mobile Computing
By Sisi Liu,Loukas Lazos,Marwan Krunz
Issue Date:October 2012
pp. 1436-1449
Cognitive radio networks (CRNs) involve extensive exchange of control messages, which are used to coordinate critical network functions such as distributed spectrum sensing, medium access, and routing, to name a few. Typically, control messages are broadca...
 
Thwarting Control-Channel Jamming Attacks from Inside Jammers
Found in: IEEE Transactions on Mobile Computing
By Sisi Liu,Loukas Lazos,Marwan Krunz
Issue Date:September 2012
pp. 1545-1558
Coordination of network functions in wireless networks requires frequent exchange of control messages among participating nodes. Typically, such messages are transmitted over a universally known communication channel referred to as the control channel. Due...
 
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
Found in: IEEE Transactions on Mobile Computing
By Tao Shu, Marwan Krunz, Sisi Liu
Issue Date:July 2010
pp. 941-954
Compromised node and denial of service are two key attacks in wireless sensor networks (WSNs). In this paper, we study data delivery mechanisms that can with high probability circumvent black holes formed by these attacks. We argue that classic multipath r...
 
Thwarting inside jamming attacks on wireless broadcast communications
Found in: Proceedings of the fourth ACM conference on Wireless network security (WiSec '11)
By Loukas Lazos, Marwan Krunz, Sisi Liu
Issue Date:June 2011
pp. 29-40
We address the problem of jamming-resistant broadcast communications under an internal threat model. We propose a time-delayed broadcast scheme (TDBS), which implements the broadcast operation as a series of unicast transmissions, distributed in frequency ...
     
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
Found in: Proceedings of the second ACM conference on Wireless network security (WiSec '09)
By Loukas Lazos, Marwan Krunz, Sisi Liu
Issue Date:March 2009
pp. 1-24
We address the problem of control-channel jamming attacks in multi-channel ad hoc networks. Deviating from the traditional view that sees jamming attacks as a physical-layer vulnerability, we consider a sophisticated adversary who exploits knowledge of the...
     
 1