The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: ad-hoc networks; multicast and scheduling; traffic engineering; performance evaluation; network security; optical networks; transport layer; sensor networks; Web applications; security management; network survivability; industry track; QoS in heterogenous wireless networks; workshop on multimedia systems and networking
A network management system software is prototyped using a service-oriented architecture with its core built using Jini and JavaSpaces technologies. The management system allows users to provision connections across multiple management domains. The system's functional modules are distributed to different management domains. Since the new management system is a distributed system, it imposes special...
Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The problem stems in large part from the constant innovation and evolution of attack techniques. The trend leads importance to the concept of intrusion tolerance a critical system must fend off or at least limit the damage caused by unknown and/or undetected attacks. In prior work, we developed...
In this paper, we propose a new and rather simple grouped-subcarrier allocation algorithms with proportional fairness among users in downlink OFDM transmission. The proposed algorithm tries to minimize the required transmit power while satisfying the rate requirement and BER constraint of each user. Subcarrier and power allocation are performed in two steps. We are mainly focusing on the subcarrier...
IP storage area networks are based on bulk data transfer over a binary erasure channel and associated bulk data storage in end systems, which are also subjected to erasures. The paper motivates a possibility of an integrated approach to transport and data storage reliability in storage area networks (SAN) which reduces the protocol processing complexities. The integrated transport/storage reliability...
Most malware are introduced into a computer system by applications that communicate with the outside world. These applications (called portals) are key components for system security. This paper presents an efficient anti-malware framework under Linux by monitoring the behavior of these portals and isolating the files they induced. The files created or modified by the monitored applications will be...
Even though numerous proposals have been made for mobility management schemes in heterogeneous wireless IP networks, no single solution has emerged that is capable of supporting seamless and low latency handovers required to satisfy the stringent delay requirements of real-time multimedia applications. In this paper, we present a location-based mobility management architecture for realtime applications...
We consider the energy-efficient transmission of traffics with hard delay constraint over wireless ad hoc networks. We adopt a cross-layer design approach and develop a route configuration method such that the average energy cost for packet delivery is minimized while maintaining the required delivery ratio. In particular, we allow the intermediate nodes to drop a packet when the node has performed...
Recent work on distributed RAM sharing has largely focused on leveraging low-latency networking technologies to optimize remote memory access. In contrast, we revisit the idea of RAM sharing on a commodity cluster with an emphasis on the prevalent gigabit Ethernet technology. The main point of the paper is to present a practical solution-a distributed RAM disk (dRamDisk) with an adaptive read-ahead...
We study the uplink performance of wireless infrared code-division multiple access (CDMA) networks using OOK with optical orthogonal codes (OOC's). The analysis is performed in two cases assuming a cellular network architecture, in which all users are uniformly distributed in the cell's area. The first case is when all users transmit with the same power and no power control mechanism is used. Then,...
The increasing demand for and the wide adoption of mobile technologies have been witnessed in enterprise information technology (IT) environments in recent years. However, there exist few solutions to address the applicability of mobile technologies or devices in enterprise security management (ESM). In this paper we present an approach to enabling mobility in ESM, whereby security administrators...
We present an approach to the question of evaluating worm defenses against future, yet unseen, and possibly defense-aware worm behavior. Our scheme employs model checking to produce worm propagation sequences that defeat a worm defense of interest. We demonstrate this approach using an exemplar collaborative worm defense, in which LANs share alerts about encountered infections. Through model checking...
In emergency preparedness, the supervision and control of context aware physical environments that can be subjected to critical conditions, such as fire or leaking of toxic liquids, have to be well covered and reliably monitored by a wireless sensor network. In this paper, we present an efficient energy and coverage protocol using wireless sensors and discuss its energy cost analysis
The secure operation of ad hoc networks faces the novel challenge of location verification on top of the security challenges that wireline networks face. The novelty lies in the fact that a node can correctly validate who it is, but lie about its location and exploit this to create problems to the network. There are three main factors that make ad hoc networks more vulnerable: (a) nodes can overhear...
The current state of the art in detecting immediate and long-term railway track problems involves both inspectors walking the track lines and train cars instrumented with accelerometers and ultrasonic sensors that are capable of detecting wear of the rail and breakages. Additionally, a widespread practice of sensing rail continuity by using the tracks to complete simple circuits is in place. In this...
In-network data aggregation in an essential operation to reduce energy consumption in large-scale wireless sensor networks. With data aggregation, however, raw data items are invisible to the base station and thus the authenticity of the aggregated data is hard to guarantee. A compromised sensor node may forge an aggregation value and mislead the base station into trusting a false reading. Due to...
We consider the problem of reliability modeling and analysis of hierarchical clustered wireless sensor networks (WSN) in this paper. We propose reliability measures that integrate the conventional connectivity-based network reliability with the sensing coverage measure indicating the quality of service (QoS) of the WSN. And we propose a progressive approach for evaluating such coverage-oriented QoS...
The allocation of scare spectral resources to support as many user running multimedia applications as possible while maintaining acceptable quality of service (QoS) is a fundamental problem in next generation wireless cellular networks. In this paper, we propose an adaptive bandwidth framework which aims at providing an effective management of the limited radio resources in wireless cellular networks...
Building a multicast tree in an overlay network is the major problem in application layer multicast. In a selfish overlay network, the end hosts may not be cooperative. They are willing to maximize their own benefits instead of being loyal to the protocol or altruistically contributing to the benefits of the whole overlay network. In this paper, we design a strategyproof mechanism in building a truthful...
NIDS is a powerful tool to defense the malicious attacks over the Internet. For the purpose of detecting the attack online, NIDS must inspect the payload of the packets very fast to expose the malicious code. String matching is a very important module in NIDS. To raise the performance of the string matching algorithm, we introduce an improved Wu-Manber algorithm QWM in this article. It combined the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.