October 20, 2014

Modeling and Automated Containment of Worms |FTD0807

Modeling and Automated Containment of Worms : IEEE2008 Abstract— Self-propagating codes, called worms, such as Code Red, Nimda, and Slammer, have drawn significant attention due to […]
October 20, 2014

Minimizing File Download Time in Stochastic Peer-to-Peer Networks |FTD0806

Minimizing File Download Time in Stochastic Peer-to-Peer Networks : IEEE2008   Abstract—The peer-to-peer (P2P) file-sharing applications are becoming increasingly popular and account for more than 70% […]
October 20, 2014

Compaction of Schedules and a Two-Stage Approach for Duplication-Based DAG Scheduling | FTJ0904

Compaction of Schedules and a Two-Stage Approach for Duplication-Based DAG Scheduling : IEEE 2009 Abstract: Many DAG scheduling algorithms generate schedules that require prohibitively large number […]
October 20, 2014

Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks | FTD0805

Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks : IEEE2008 Abstract—Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such […]
October 20, 2014

A J2ME-Based Wireless Intelligent Video Surveillance System Using Moving Object Recognition Technology | FTJ0903

A J2ME-Based Wireless Intelligent Video Surveillance System Using Moving Object Recognition Technology : IEEE 2009 Abstract: A low-cost intelligent mobile phone-based wireless video surveillance solution using […]