Sciweavers

AINA
2008
IEEE
14 years 6 months ago
Momentum-Based Motion Detection Methodology for Handoff in Wireless Networks
This paper presents a novel motion detection scheme by using the Momentum of Received Signal Strength (MRSS) to improve the quality of handoff in a general wireless network. MRSS ...
Tein-Yaw Chung, Chih-Hung Hsu, Yung-Mu Chen, K. Ro...
AINA
2008
IEEE
14 years 6 months ago
Automated Classification of Port-Scans from Distributed Sensors
Hiroaki Kikuchi, Naoya Fukuno, Tomohiro Kobori, Ma...
AINA
2008
IEEE
14 years 6 months ago
Improved TCAM-Based Pre-Filtering for Network Intrusion Detection Systems
—With the increasing growth of the Internet, the explosion of attacks and viruses significantly affects the network security. Network Intrusion Detection System (NIDS) is develop...
Yeim-Kuan Chang, Ming-Li Tsai, Cheng-Chien Su
AINA
2008
IEEE
14 years 6 months ago
Senceive: A Middleware for a Wireless Sensor Network
— A significant amount of research effort is being carried out by the research community to increase the scope and usefulness of wireless sensor networks; to optimise life time ...
Christian Hermann, Waltenegus Dargie
AINA
2008
IEEE
14 years 6 months ago
Fairness of High-Speed TCP Stacks
We present experimental results evaluating fairness of several proposals to change the TCP congestion control algorithm, in support of operation on high bandwidth-delayproduct (BD...
Dimitrios Miras, Martin Bateman, Saleem N. Bhatti
AINA
2008
IEEE
14 years 6 months ago
Performance Analysis of Data Delivery Schemes for a Multi-Sink Wireless Sensor Network
Wireless sensor networks are expected to be deployed in harsh environments characterised by extremely poor and fluctuating channel conditions. With the commonly adopted single-si...
Hwee Pink Tan, Adriana Felicia Gabor, Winston Khoo...
AINA
2008
IEEE
14 years 6 months ago
An Experience Improving Intrusion Detection Systems False Alarm Ratio by Using Honeypot
When traditional firewall and intrusion detection systems (IDS) are used to detect possible attacks from the network, they often make wrong decisions and block the legitimate conn...
Babak Khosravifar, Jamal Bentahar
AINA
2008
IEEE
14 years 6 months ago
Optimal Resource Discovery Paths of Gnutella2
This paper shows that the performance of peer-to-peer resource discovery algorithms is upper bounded by a k-Steiner minimum tree and proposes an algorithm locating near-optimal qu...
Mikko Vapa, Annemari Auvinen, Yevgeniy Ivanchenko,...
AINA
2008
IEEE
14 years 6 months ago
Mutation Testing of Protocol Messages Based on Extended TTCN-3
Chuanming Jing, Zhiliang Wang, Xingang Shi, Xia Yi...
AINA
2008
IEEE
14 years 6 months ago
Dynamic Cache Invalidation Scheme in IR-Based Wireless Environments
Traditional cache invalidation schemes are not suitable to be employed in wireless environments due to the affections of mobility, energy consumption, and limited bandwidth. Cache ...
Yeim-Kuan Chang, Yi-Wei Ting, Tai-Hong Lin