The Community for Technology Leaders
Green Image
Issue No. 02 - March/April (vol. 8)
ISSN: 1545-5971

Adaptive Fault-Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks (Abstract)

Ing-Ray Chen , Virginia Tech, Falls Church
Anh Phan Speer , Virginia Tech, Falls Church
Mohamed Eltoweissy , Virginia Tech, Falls Church
pp. 161-176

Application-Level Diagnostic and Membership Protocols for Generic Time-Triggered Systems (Abstract)

Marco Serafini , TU Darmstadt, Darmstadt
Péter Bokor , TU Darmstadt, Darmstadt
Neeraj Suri , TU Darmstadt, Darmstadt
Jonny Vinter , SP Swedish National Testing and Research Institute, Boras
Astrit Ademaj , TU Wien, Vienna
Wolfgang Brandstätter , AUDI, Ingolstadt
Fulvio Tagliabò , Centro Ricerche Fiat, Orbassano
Jens Koch , Airbus Deutschland, Hamburg
pp. 177-193

A Tamper-Resistant Programming Language System (Abstract)

Dennis Heimbigner , University of Colorado, Boulder
pp. 194-206

Chip Self-Organization and Fault Tolerance in Massively Defective Multicore Arrays (Abstract)

Jacques Henri Collet , CNRS, Université de Toulouse, Toulouse
Piotr Zajac , CNRS, Université de Toulouse, Toulouse and Technical University of Lodz, Lodz
Mihalis Psarakis , University of Piraeus, Piraeus
Dimitris Gizopoulos , University of Piraeus, Piraeus
pp. 207-217

Comparative Evaluation of Spoofing Defenses (Abstract)

Jelena Mirkovic , USC Information Sciences Institute, Marina Del Rey
Ezra Kissel , University of Delaware, Newark
pp. 218-232

Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA (Abstract)

John Felix Charles Joseph , Nanyang Technological University, Singapore
Bu-Sung Lee , Nanyang Technological University, Singapore
Amitabha Das , Infosys Technologies Ltd., Bangalore
Boon-Chong Seet , Auckland University of Technology, Auckland
pp. 233-245

Diagnosability of Two-Matching Composition Networks under the MM{}^{\ast} Model (Abstract)

Chia-Wei Lee , National Cheng Kung University, Tainan
Sun-Yuan Hsieh , National Cheng Kung University, Tainan
pp. 246-255

Nymble: Blocking Misbehaving Users in Anonymizing Networks (Abstract)

Patrick P. Tsang , Dartmouth College, Hanover
Apu Kapadia , Indiana University, Bloomington
Cory Cornelius , Dartmouth College, Hanover
Sean W. Smith , Dartmouth College, Hanover
pp. 256-269

On Complexity and Approximability of Optimal DoS Attacks on Multiple-Tree P2P Streaming Topologies (Abstract)

Sascha Grau , Technische Univerität Ilmenau, Ilmenau
Mathias Fischer , Technische Universität Ilmenau, Ilmenau
Michael Brinkmeier , Technische Universität Ilmenau, Ilmenau
Günter Schäfer , Technische Universität Ilmenau, Ilmenau
pp. 270-281

Online Intrusion Alert Aggregation with Generative Data Stream Modeling (Abstract)

Alexander Hofmann , University of Passau, Passau
Bernhard Sick , University of Passau, Passau
pp. 282-294

SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks (Abstract)

Jinyuan Sun , University of Florida, Gainesville
Chi Zhang , University of Florida, Gainesville
Yanchao Zhang , New Jersey Institute of Technology, Newark
Yuguang Fang , University of Florida, Gainesville
pp. 295-307

Fault Injection in Modern Microprocessors Using On-Chip Debugging Infrastructures (Abstract)

Marta Portela-García , University Carlos III of Madrid, Leganés
Celia López-Ongil , University Carlos III of Madrid, Leganés
Mario García Valderas , University Carlos III of Madrid, Leganés
Luis Entrena , University Carlos III of Madrid, Leganés
pp. 308-314

On the Security of Chien's Ultralightweight RFID Authentication Protocol (Abstract)

Hung-Min Sun , National Tsing Hua University, Hsinchu
Wei-Chih Ting , Industrial Technology Research Institute, Hsinchu
King-Hang Wang , Hong Kong Institute of Technology, Hong Kong
pp. 315-317
82 ms
(Ver 3.3 (11022016))