Sciweavers

CNSR
2004
IEEE
131views Communications» more  CNSR 2004»
14 years 3 months ago
Fast Flow Classification over Internet
In order to control and manage highly aggregated Internet traffic flows efficiently, we need to be able to categorize flows into distinct classes and to be knowledgeable about the...
A. Oveissian, Kavé Salamatian, Augustin Sou...
CNSR
2004
IEEE
14 years 3 months ago
Trusted Route Discovery with TORA Protocol
An ad-hoc network is formed when a group of wireless nodes pledge to help each other in passing packets based upon a pre-agreed protocol. Temporally Ordered Routing Algorithm (TOR...
Asad Amir Pirzada, Chris McDonald
CNSR
2004
IEEE
153views Communications» more  CNSR 2004»
14 years 3 months ago
Improving the Referrer-Based Web Log Session Reconstruction
In this paper we discuss the kinds of ambiguities a heuristic encounters during the process of user session reconstruction. Some criteria are introduced to measure these ambiguiti...
Mehran Nadjarbashi-Noghani, Ali A. Ghorbani
CNSR
2004
IEEE
174views Communications» more  CNSR 2004»
14 years 3 months ago
Network Intrusion Detection Using an Improved Competitive Learning Neural Network
This paper presents a novel approach for detecting network intrusions based on a competitive learning neural network. In the paper, the performance of this approach is compared to...
John Zhong Lei, Ali A. Ghorbani
CNSR
2004
IEEE
180views Communications» more  CNSR 2004»
14 years 3 months ago
The Reconstruction of User Sessions from a Server Log Using Improved Time-Oriented Heuristics
Web usage mining plays an important role in the personalization of Web services, adaptation of Web sites, and the improvement of Web server performance. It applies data mining tec...
Jie Zhang, Ali A. Ghorbani
CNSR
2004
IEEE
115views Communications» more  CNSR 2004»
14 years 3 months ago
The Effectiveness of Brute Force Attacks on RC4
Nathaniel Couture, Kenneth B. Kent
CNSR
2004
IEEE
153views Communications» more  CNSR 2004»
14 years 3 months ago
An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network
In this paper, we propose a pairing-based signcryption scheme for authenticated broadcasting, which requires less computation than a previously proposed scheme suggesting identity...
Muhammad J. Bohio, Ali Miri
CNSR
2004
IEEE
218views Communications» more  CNSR 2004»
14 years 3 months ago
CSN: A Network Protocol for Serving Dynamic Queries in Large-Scale Wireless Sensor Networks
A fundamental problem that confronts future applications of sensor networks is how to efficiently locate the sensor node that stores a particular data item. It is known that distr...
Muneeb Ali, Zartash Afzal Uzmi
AICT
2006
IEEE
123views Communications» more  AICT 2006»
14 years 3 months ago
Issues related to Development of Wireless Peer-to-Peer Games in J2ME
This paper describes and discusses challenges related to development of peer-to-peer games in J2ME using the available Bluetooth API (JSR82). By using Bluetooth on wireless device...
Alf Inge Wang, Michael Sars Norum, Carl-Henrik Wol...