The Community for Technology Leaders
Green Image
Issue No. 02 - March/April (vol. 8)
ISSN: 1545-5971

Adaptive Fault-Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks (Abstract)

Mohamed Eltoweissy , Virginia Tech, Falls Church
Anh Phan Speer , Virginia Tech, Falls Church
Ing-Ray Chen , Virginia Tech, Falls Church
pp. 161-176

Application-Level Diagnostic and Membership Protocols for Generic Time-Triggered Systems (Abstract)

Marco Serafini , TU Darmstadt, Darmstadt
Fulvio Tagliabò , Centro Ricerche Fiat, Orbassano
Neeraj Suri , TU Darmstadt, Darmstadt
Jonny Vinter , SP Swedish National Testing and Research Institute, Boras
Astrit Ademaj , TU Wien, Vienna
Jens Koch , Airbus Deutschland, Hamburg
Péter Bokor , TU Darmstadt, Darmstadt
Wolfgang Brandstätter , AUDI, Ingolstadt
pp. 177-193

A Tamper-Resistant Programming Language System (Abstract)

Dennis Heimbigner , University of Colorado, Boulder
pp. 194-206

Chip Self-Organization and Fault Tolerance in Massively Defective Multicore Arrays (Abstract)

Mihalis Psarakis , University of Piraeus, Piraeus
Dimitris Gizopoulos , University of Piraeus, Piraeus
Piotr Zajac , CNRS, Université de Toulouse, Toulouse and Technical University of Lodz, Lodz
Jacques Henri Collet , CNRS, Université de Toulouse, Toulouse
pp. 207-217

Comparative Evaluation of Spoofing Defenses (Abstract)

Ezra Kissel , University of Delaware, Newark
Jelena Mirkovic , USC Information Sciences Institute, Marina Del Rey
pp. 218-232

Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA (Abstract)

Amitabha Das , Infosys Technologies Ltd., Bangalore
John Felix Charles Joseph , Nanyang Technological University, Singapore
Bu-Sung Lee , Nanyang Technological University, Singapore
Boon-Chong Seet , Auckland University of Technology, Auckland
pp. 233-245

Diagnosability of Two-Matching Composition Networks under the MM{}^{\ast} Model (Abstract)

Sun-Yuan Hsieh , National Cheng Kung University, Tainan
Chia-Wei Lee , National Cheng Kung University, Tainan
pp. 246-255

Nymble: Blocking Misbehaving Users in Anonymizing Networks (Abstract)

Patrick P. Tsang , Dartmouth College, Hanover
Cory Cornelius , Dartmouth College, Hanover
Sean W. Smith , Dartmouth College, Hanover
Apu Kapadia , Indiana University, Bloomington
pp. 256-269

On Complexity and Approximability of Optimal DoS Attacks on Multiple-Tree P2P Streaming Topologies (Abstract)

Michael Brinkmeier , Technische Universität Ilmenau, Ilmenau
Günter Schäfer , Technische Universität Ilmenau, Ilmenau
Mathias Fischer , Technische Universität Ilmenau, Ilmenau
Sascha Grau , Technische Univerität Ilmenau, Ilmenau
pp. 270-281

Online Intrusion Alert Aggregation with Generative Data Stream Modeling (Abstract)

Bernhard Sick , University of Passau, Passau
Alexander Hofmann , University of Passau, Passau
pp. 282-294

SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks (Abstract)

Jinyuan Sun , University of Florida, Gainesville
Yuguang Fang , University of Florida, Gainesville
Yanchao Zhang , New Jersey Institute of Technology, Newark
Chi Zhang , University of Florida, Gainesville
pp. 295-307

Fault Injection in Modern Microprocessors Using On-Chip Debugging Infrastructures (Abstract)

Mario García Valderas , University Carlos III of Madrid, Leganés
Marta Portela-García , University Carlos III of Madrid, Leganés
Celia López-Ongil , University Carlos III of Madrid, Leganés
Luis Entrena , University Carlos III of Madrid, Leganés
pp. 308-314

On the Security of Chien's Ultralightweight RFID Authentication Protocol (Abstract)

King-Hang Wang , Hong Kong Institute of Technology, Hong Kong
Wei-Chih Ting , Industrial Technology Research Institute, Hsinchu
Hung-Min Sun , National Tsing Hua University, Hsinchu
pp. 315-317
45 ms
(Ver 3.3 (11022016))