Search
Now showing items 31-40 of 197
A Defense System on DDOS Attacks in Mobile Ad Hoc Networks
(2009-02-23)
Network security is a weak link in wired and wireless network systems. Malicious attacks have caused tremendous loss by impairing the functionalities of the computer networks. Denial of Service (DoS) and Distributed DoS ...
Analysis of Video Latency in UAV Wired and Wireless Networks
(2009-02-23)
The ability to utilize wireless networks to transmit information offers many benefits as compared to wired networks. For example, in Unmanned Aerial Vehicle (UAV) military applications current technology relies on a wired ...
Practical Stateless Geographical Routing (PSGR) - 3-D Stateless Geographic Routing for Underwater Acoustic Sensor Networks
(2009-02-23)
Underwater acoustic sensor networks have recently gained increasing research attentions due to their vast potential applications. Although the limited bandwidth and power resources in such networks have made stateless ...
Neural Enhancement for Multiobjective Optimization
(2008-09-09)
In this work, a neural network approach is applied to multiobjective optimization problems in order to expand the set of optimal solutions. The network is trained using results obtained from existing evolutionary multiobjective ...
Usability Size N
(2009-02-23)
In the software development cycle, it is often the practice that developers will hold usability studies to test the accuracy and effectiveness of the software and to retrieve user response as to the satisfaction or usability ...
Talking Games: An Empirical Study of Speech-based Cursor Control Mechanisms
(2008-09-09)
This document describes a study of speech-based cursor control mechanisms along with a new proposed approach called NameTags. This research is intended to provide empirical user data to inform the design of future systems ...
Generic Reverse Engineering Architecture with Compiler and Compression Classification Components
(2009-02-23)
As more and more applications, libraries, and other types of programs are being executed in untrusted environments they will be targets of attackers. These applications are exposed to malicious programs attempting to exploit ...
Quantitative Risk Assessment Model for Software Security in the Design Phase of Software Development
(2009-02-23)
Risk analysis is a process for considering possible risks and determining,which are the most significant for any particular effort. Determining which risks to address and the optimum strategy for mitigating said risks is ...
Using a Helio Based Protocol in a Battlefield Sensor Network with Directional Antennas and Enhanced Security
(2008-09-09)
The problem is that current battlefield sensors are deployed close to each other, are draining
batteries at a fast pace, are using protocols that result in late and coarse grain information, and
put the human operator ...
Energy-Efficient Resource Management for High-performance Computing Platforms
(2008-09-09)
In the past decade, high-performance computing (HPC) platforms like clusters and computational grids have been widely used to solve challenging and rigorous engineering tasks in industry and scientific applications. Due ...