The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless sensor networks become ubiquitous to collect people's information in many people-centric applications, such as, health care, smart space and public safety. Because any misusage of these personal data might result in the leakage of privacy, it is expected that the data requesters can only access to the data what they are entitled to read. Based on a revised hash chain technique, we proposed...
One of the major applications of wireless sensor networks is guiding navigation service whose goal is to find a way to guide moving objects across a hazardous region covered by sensors. Sensor networks maintain safe paths by which the moving objects can be guided safely to exits. In this paper, we propose a distributed guiding navigation protocol for constructing area-to-area optimal guiding paths...
Many data gathering systems require the deployment of heterogeneous sensors to detect various aspects of the target and the use of wireless networks to transmit sensed data to the control center. The data rates of the heterogeneous sensors may range from a few bytes per minute to megabytes per second. To support the transmissions of such diverse rates of data through the wireless network, we propose...
Correlated failures have recently gained more attention in the research of failures in large scale systems. Recent studies have pointed out the negative effect of ignoring such failures when designing a fault tolerant scheme for large scale systems. In this paper, we explore the behaviors of temporal correlated failures arising from cyclic dependency among task nodes via an abstract model. Using this...
A major concern for network intrusion detection systems is the ability of an intruder to evade the detection by routing through a chain of the intermediate hosts to attack a target machine and maintain the anonymity. Such an intermediate host is called a stepping-stone. The intruders have developed some evasion techniques such as injecting chaff packets. A number of algorithms have been proposed to...
In Peer-to-Peer (P2P) networks if adversaries such as Sybil attackers have got most identities in the network, they will control routing table or traffic. In this paper, we propose a framework based on two complementary techniques to defense malicious node after they transmit data to other malicious peers instead of honest peers. The first approach, based on behaviors of destination nodes, is used...
Failures are a permanent menace for the availability of Internet services. During the last decades, numerous fault-tolerant approaches have been proposed for the wide spectrum of Internet services, including stateful firewalls. Most of these solutions adopt reactive approaches to mask failures by replicating state-changes between replicas. However, reactive replication is a resource consuming task...
In this paper, we use reliability theory to determine the answer of an important question about how often we need to update a piece of secure information. For example, one may need to determine an appropriate time for updating a new password. To generalize, we compute an efficient updating time for a dependable secure computing (DSC) system which stores secret information in a reliable and secure...
Wireless sensor networks (WSNs) consist of large number of sensor nodes with limited sensing, processing and communication capabilities that cooperatively fulfill environmental sensing and monitoring tasks. WSNs are meant to be deployed in large numbers in various environments, including remote and more importantly harsh environments ensuing potential hardware or software faults which consequently...
The use of good random numbers is essential to the integrity of many mission-critical systems. However, when such systems are replicated for Byzantine fault tolerance, a serious issue arises, i.e., how do we preserve the integrity of the systems while ensuring strong replica consistency? Despite the fact that there exists a large body of work on how to render replicas deterministic under the benign...
Greedy routing protocols provide a scalable and cost effective solution for routing packets in mobile ad-hoc networks (MANETs). However, such routing protocols can not be used in the networks where holes exist. We propose a virtual ring-based hole avoiding routing protocol (VRHAR) in MANETs where holes exist. Simulation studies show that the proposed protocol can improve the routing performance more...
Wireless networks and multimedia applications are two rapidly emerging technological trends. The IEEE 802.11e protocol has been developed to support QoS for such delay-sensitive applications in wireless networks. This protocol has also been extensively studied in the literature over the past few years, and several mechanisms to improve its performance have been proposed concentrating on ways to reinforce...
Networks on-chip (NoC) emerged as a promising communication medium for future MPSoC development. To serve this purpose, the NoCs have to be able to efficiently exchange all types of traffic including the collective communications at a reasonable cost. The Quarc NoC is introduced as a NOC which is highly efficient in performing collective communication operations such as broadcast and multicast. This...
Massive Multiuser Virtual Environments (MMVEs) and especially the idea of a ''3D Web'' as a combination of a MMVE and today's WWW currently attracts a lot of attention. The realization of such a vision on a global scale though poses severe technical challenges to the underlying network infrastructure. It is generally accepted that such a global scale scenario can only be realized in a distributed...
We propose the design of Plug, an application to find and keep contacts with friends within many inter-connected 3D virtual worlds. Users use an instant messenger (IM)-like interface to converse with friends and find new contacts, using a virtual representation of the user's self. It consists of three parts: a plug is an automatous agent / avatar situated at a user's computer that reflects and mimics...
As the rapidly development of embedded systems, it is a challenge for universities to fill the gap between education and industry. In this paper, we introduce the experiment designed for embedded system curriculum based on embedded IA first, and then adapt the design to the new promising processor-Atom?? - developed by Intel. At last, we will share our experiences in the experiment teaching of embedded...
This paper reports the design of two courses, "embedded hardware'' and "embedded software" offered in 2008 spring semester at Hiroshima University. These courses use 16-bit processor TINYCPU, cross assembler TINYASM, and cross compiler TINYC. They are designed very simple and compact: The total number of lines of the source code is only 427. Thus, students can understandthe entire design...
Networks on chip (NoCs) communicate the components located inside a chip. Overall system performance depends on NoC performance, that is affected by several factors. One of them is the network clock frequency, imposed by the critical path delay. Recent works show that switch critical path includes buffer control logic. Consequently, by removing switch buffers, switch frequency can be doubled. In this...
This paper presents the design and implementation of an intensive curriculum on embedded software design for university or college graduates of engineering background, who are seeking job opportunities in developing software for embedded system products. It is part of a government-conducted project intending to resolve the shortage of embedded software engineers in SoC (System-on-Chip) and related...
This paper introduces the Quarc NoC, a novel NoC architecture inspired by the Spidergon NoC. The Quarc scheme significantly outperforms the Spidergon NoC through balancing the traffic which is the result of the modifications applied to the topology and the routing elements.The proposed architecture is highly efficient in performing collective communication operations including broadcast and multicast...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.