A navigator in this case aims to control the mobile sensor to get close to the moving target from any initial position. Since the target maneuvers are not known a priori to the controller, solving the problem requires a real-time strategy. The joint problem of mobile sensor navigation and mobile target tracking based on a […]
Network Traffic Characterization Using Triangle area-based Multivariate Correlation Analysis
DENIAL-OF-SERVICE (DoS) attacks are one type of aggressive and menacing intrusive behavior to online servers. DoS attacks severely degrade the availability of a victim a host, a router, or an entire network. They impose intensive computation tasks to the victim by exploiting its system vulnerability or flooding it with huge amount of useless packets. The […]
Node localization in mobile sensor networks in Noisy Environments
WIRELESS sensor networks (WSNs) are increasingly a part of the modern landscape. Disciplines as diverse as volcanic eruption prediction and disaster response benefit from the addition of sensing and networking. A common requirement of many wireless sensor network systems is localization, where deployed nodes in a network discover their positions. smaller networks covering small areas, […]
VMISO links for multihop wireless network
SPACE-TIME communication is a technique that leverages the spatial and temporal variations of the channel to significantly enhance the performance of wireless networks. This communication paradigm can be realized using multiple antenna element arrays where the antenna elements are separated sufficiently (of the order of the wavelength of the carrier used) such that the channel […]
SWNET Cooperative Content caching policies
RECENT emergence of data enabled mobile devices and wireless-enabled data applications have fostered new content dissemination models in today’s mobile ecosystem. A list of such devices includes Apple’s iPhone, Google’s Android, Amazon’s Kindle, and electronic book readers from other vendors. The array of data applications includes electronic book and magazine readers and mobile phone Apps. […]
Detecting Distributed Reflection DoS Attacks based on Rank Correlation
DDoS presents a serious threat to the Internet since its inception, where lots of controlled hosts flood the victim site with massive packets. Moreover, in Distributed Reflection DoS (DRDoS), attackers fool innocent servers (reflectors) into flushing packets to the victim. But most of current DRDoS detection mechanisms are associated with specific protocols and cannot be […]
Cloud oriented Content Delivery Network paradigm within a multi-provider Networked Cloud Environment
In this paper is placed on the introduction, design and assessment of a complete model and framework aiming specifically at the deployment of a Cloud oriented Content Delivery Network paradigm within a multi-provider Networked Cloud Environment. A hierarchical framework is proposed and evaluated towards an efficient and scalable solution of content distribution over a multi-provider […]
Reconstruction of missing blocks in image transmission by using self-embedding
A new model of the content reconstruction problem in self-embedding systems, based on an erasure communication channel. In addition to the content hashes for authentication purposes, an encoder embeds in the image a reconstruction reference, which describes the content, and which can be used by a dedicated decoder to restore the tampered image fragments. Hence […]
Website Structure Improvement through Facilitating Effective User Navigation
A primary reason is that the web developers’ understanding of how a website should be structured can be considerably different from that of the users. While various methods have been proposed to relink webpages to improve navigability using user navigation data, the completely reorganized new structure can be highly unpredictable, and the cost of disorienting […]