-
1
-
-
0345507484
-
A taxonomy for distributed real-time control systems
-
Agre, J., L. Clare, and S. Sastry, A taxonomy for distributed real-time control systems, Adv. Computer. 49:303-352 (1999).
-
(1999)
Adv. Computer
, vol.49
, pp. 303-352
-
-
Agre, J.1
Clare, L.2
Sastry, S.3
-
2
-
-
0036688074
-
A survey of sensor networks
-
Akyildiz, I. F., W. Su, E. Cayirici, and Y. Sankarasubramaniam, A survey of sensor networks, IEEE Commun. Mag., 8:102-114 (2002).
-
(2002)
IEEE Commun. Mag.
, vol.8
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Cayirici, E.3
Sankarasubramaniam, Y.4
-
3
-
-
0037086890
-
Wireless sensor networks: A survey
-
Akyildiz, I. F., W. Su , Y. Sankarasubramaniam, and E. Cayirci, Wireless sensor networks: A survey, Comput. Networks 38:393-422 (2002).
-
(2002)
Comput. Networks
, vol.38
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
4
-
-
0003971635
-
Information Technology-Telecommunication and Information Exchange between Systems-Local and Metropolitan Area Networks Specific Requirements-Part 11: Wireless LAN medium access control (MAC) and Physical Layer (PHY) Specifications
-
P802.11k (C/LM) Amendment to STANDARD [FOR], Radio Resource Measurement ofWireless LANs
-
P802.11k (C/LM) Amendment to STANDARD [FOR]. Information Technology-Telecommunication and Information Exchange between Systems-Local and Metropolitan Area Networks Specific Requirements-Part 11: Wireless LAN medium access control (MAC) and Physical Layer (PHY) Specifications, Radio Resource Measurement ofWireless LANs, 1999.
-
(1999)
-
-
-
5
-
-
0022604939
-
Optimal data fusion in multiple sensor detection systems
-
Anonymous
-
Anonymous, Optimal data fusion in multiple sensor detection systems, IEEE Trans. Aerospace Electro. Syst., AES-22:98-101 (1988).
-
(1988)
IEEE Trans. Aerospace Electro. Syst.
, vol.AES-22
, pp. 98-101
-
-
-
6
-
-
28844464671
-
Sensim: A Wireless Sensor Network Simulation Template
-
M.S. Project, Dept. Computer Science, Louisiana State Univ. Baton Rouge
-
Basavaraju, S., Sensim: A Wireless Sensor Network Simulation Template, M.S. Project, Dept. Computer Science, Louisiana State Univ. Baton Rouge.
-
-
-
Basavaraju, S.1
-
7
-
-
85032668813
-
Macaw: A media access protocol for wireless LANS
-
Proc. ACM SIGCOMM 1994
-
Bharghavan, V., A. Demers, S. Shenker, and L. Zhang, Macaw: A media access protocol for wireless LANS, Proc. ACM SIGCOMM 1994, 1994.
-
(1994)
-
-
Bharghavan, V.1
Demers, A.2
Shenker, S.3
Zhang, L.4
-
8
-
-
78650570043
-
Intelligent component based automation of baggage handling systems with IEC 61499
-
Black,G. andV. Vyatkin, Intelligent component based automation of baggage handling systems with IEC 61499, IEEE Trans. Autom. Sci. Eng. 6(2009).
-
(2009)
IEEE Trans. Autom. Sci. Eng.
, pp. 6
-
-
Black, G.1
Vyatkin, V.2
-
9
-
-
0003524084
-
Graph Theory with Applications
-
North Holland, NewYork
-
Bondy, J. A. and U. S. R. Murty, Graph Theory with Applications, North Holland, NewYork, 1976.
-
(1976)
-
-
Bondy, J.A.1
Murty, U.S.R.2
-
10
-
-
0004157072
-
Multi-Sensor Fusion
-
Prentice-Hall, Englewood Cliff, NJ
-
Brooks, R. R. and S. S. Iyengar, Multi-Sensor Fusion, Prentice-Hall, Englewood Cliff, NJ, 1997.
-
(1997)
-
-
Brooks, R.R.1
Iyengar, S.S.2
-
11
-
-
0003864139
-
Introduction to Discrete Event Systems
-
Kluwer Academic, Jan
-
Cassandras, C. G. and S. Lafortune, Introduction to Discrete Event Systems, Kluwer Academic, Jan. 1999.
-
(1999)
-
-
Cassandras, C.G.1
Lafortune, S.2
-
12
-
-
84891472673
-
Scalable Infrastructure for Distributed Sensor Networks
-
Springer-Verlag
-
Chakrabarty, K. and S. S. Iyengar, Scalable Infrastructure for Distributed Sensor Networks, Springer-Verlag, 2005.
-
(2005)
-
-
Chakrabarty, K.1
Iyengar, S.S.2
-
14
-
-
0024089416
-
NCalgorithms for recognizing chordal graphs and k-trees
-
Chandrasekharan, N. and S. Iyengar,NCalgorithms for recognizing chordal graphs and k-trees, IEEE Trans. Comput. 37:10 (1988).
-
(1988)
IEEE Trans. Comput.
, vol.37
, pp. 10
-
-
Chandrasekharan, N.1
Iyengar, S.2
-
15
-
-
84886695808
-
Crossbow Imote2 Datasheet
-
courtesy Crossbow Technologies
-
Crossbow Imote2 Datasheet, courtesy Crossbow Technologies.
-
-
-
-
16
-
-
84886653387
-
Crossbow MIB520 Datasheet
-
courtesy Crossbow Technologies
-
Crossbow MIB520 Datasheet, courtesy Crossbow Technologies.
-
-
-
-
17
-
-
84886677046
-
Crossbow Moteworks Software Reference Manual
-
courtesy Crossbow Technologies
-
Crossbow Moteworks Software Reference Manual, courtesy Crossbow Technologies.
-
-
-
-
18
-
-
84886701850
-
Crossbow Product Feature Reference Manual
-
courtesy Crossbow Technologies
-
Crossbow Product Feature Reference Manual, courtesy Crossbow Technologies.
-
-
-
-
19
-
-
84886667205
-
Crossbow Reference Manual
-
courtesy Crossbow Technologies
-
Crossbow Reference Manual, courtesy Crossbow Technologies.
-
-
-
-
20
-
-
84873116827
-
Crossbow Telosb Datasheet
-
courtesy Crossbow Technologies
-
Crossbow Telosb Datasheet, courtesy Crossbow Technologies.
-
-
-
-
21
-
-
1542323457
-
Statl: An attack language for state-based intrusion detection
-
Proc. ACM Workshop on Intrusion Detection, Nov.
-
Eckmann, S. T., G. Vigna, and R. A. Kemmerer, Statl: An attack language for state-based intrusion detection, Proc. ACM Workshop on Intrusion Detection, Nov. 2000.
-
(2000)
-
-
Eckmann, S.T.1
Vigna, G.2
Kemmerer, R.A.3
-
22
-
-
0038341106
-
A key management scheme for distributed sensor networks
-
Proc. 9th ACM Conf. Computer and Communication Security, Nov.
-
Eschenauer, L. and V. D. Gligor, A key management scheme for distributed sensor networks, Proc. 9th ACM Conf. Computer and Communication Security, Nov. 2002, pp. 41-47.
-
(2002)
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
23
-
-
84964540406
-
Modeling system calls for intrusion detection with dynamic window sizes
-
Proc. DISCEX II
-
Eskin, E. and W. Lee, Modeling system calls for intrusion detection with dynamic window sizes, Proc. DISCEX II, 2001.
-
(2001)
-
-
Eskin, E.1
Lee, W.2
-
24
-
-
19944364001
-
Ns-2 Network Simulator
-
Technical Report, Univ. California, Berkeley
-
Fall, K. and Varadhan, Ns-2 Network Simulator, Technical Report, Univ. California, Berkeley, 2004.
-
(2004)
-
-
Fall, K.1
Varadhan2
-
25
-
-
0004159328
-
Principles of Discrete Event Simulation
-
Wiley
-
Fishman, G. S., Principles of Discrete Event Simulation, Wiley, 1978.
-
(1978)
-
-
Fishman, G.S.1
-
26
-
-
84880174811
-
Detecting intrusions using system calls: Alternative data models
-
Proc. 1999 IEEE Symp. Security and Privacy, IEEE Computer Society
-
Forrest, S., C. Warrender, and B. Pearlmutter, Detecting intrusions using system calls: Alternative data models, Proc. 1999 IEEE Symp. Security and Privacy, IEEE Computer Society, 1999, pp. 133-145.
-
(1999)
, pp. 133-145
-
-
Forrest, S.1
Warrender, C.2
Pearlmutter, B.3
-
27
-
-
84886705727
-
ZigBee Resource Guide
-
Webcom Communication Corpo.
-
Gislason, D., ZigBee Resource Guide, Webcom Communication Corpo., 2008.
-
(2008)
-
-
Gislason, D.1
-
28
-
-
84886669680
-
-
Global Sensor Networks, GSNTeam
-
Global Sensor Networks, GSNTeam. http://sourceforge.net/projects/gsn/
-
-
-
-
29
-
-
0034445661
-
System architecture directions for networked sensors
-
Hill, J.,R. Szewczyk, A.Woo, S. Hollar, D. Culler, andK. Pister, System architecture directions for networked sensors. ACM Sigplan Notices, 35:93-104 (2000).
-
(2000)
ACM Sigplan Notices
, vol.35
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
30
-
-
0034445661
-
System architecture directions for networked sensors
-
Hill, J.,R. Szewczyk, A.Woo, S. Hollar, D. Culler, andK. Pister, System architecture directions for networked sensors. In Architectural Support for Programming Languages and Operating Systems, 2000, pp. 93-104.
-
(2000)
Architectural Support for Programming Languages and Operating Systems
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
31
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
Hofmeyr, S. A., S. Forrest, and A. Somayaji, Intrusion detection using sequences of system calls, J. Comput. Security, 6(3):151-180 (1988).
-
(1988)
J. Comput. Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
32
-
-
0003620778
-
Introduction to Automata Theory, Languages, and Computation
-
2nd ed., Addison-Wesley Nov
-
Hopcraft, J. E., R.Motwani, and J. D. Ullman, Introduction to Automata Theory, Languages, and Computation, 2nd ed., Addison-Wesley Nov. 2001.
-
(2001)
-
-
Hopcraft, J.E.1
Motwani, R.2
Ullman, J.D.3
-
33
-
-
84886660023
-
-
http://blog.xbow.com/xblog/sensorboards.
-
-
-
-
34
-
-
84886647887
-
-
http://inst.eecs.berkeley.edu/cs194-5/sp08/lab1/index.html.
-
-
-
-
35
-
-
84886697794
-
-
http://www.cs.rpi.edu/cheng3/sense/.
-
-
-
-
36
-
-
84886666719
-
-
http://www.isi.edu/nsnam/ns/ns-documentation.html.
-
-
-
-
37
-
-
84886691952
-
-
IEEE Standard Dictionary of Electrical and ElectronicTerms, 6th ed., IEEE, 1997
-
IEEE Standard Dictionary of Electrical and ElectronicTerms, 6th ed., IEEE, 1997.
-
-
-
-
38
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
March
-
Ilgun, K., R. A. Kemmerer, and P. A. Porras, State transition analysis: A rule-based intrusion detection approach, IEEE Trans. Software Eng. 21(3):151-180 (March 1995).
-
(1995)
IEEE Trans. Software Eng.
, vol.21
, Issue.3
, pp. 151-180
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
39
-
-
0037295692
-
Directed diffusion for wireless sensor networking
-
Feb.
-
Intanagonwiwat, C., R. Govindan, D. Estrin, J. Heidemann, and F. Silva, Directed diffusion for wireless sensor networking, IEEE/ACM Trans. Networking 11(1):216 (Feb. 2003).
-
(2003)
IEEE/ACM Trans. Networking
, vol.11
, Issue.1
, pp. 216
-
-
Intanagonwiwat, C.1
Govindan, R.2
Estrin, D.3
Heidemann, J.4
Silva, F.5
-
40
-
-
85056041126
-
Distributed Sensor Networks
-
2nd ed., CRC Press, Dec.
-
Iyengar, S. S. and R. R. Brooks, eds., Distributed Sensor Networks, 2nd ed., CRC Press, Dec. 2004.
-
(2004)
-
-
Iyengar, S.S.1
Brooks, R.R.2
-
41
-
-
85056041126
-
Distributed Sensor Networks
-
CRC Press
-
Iyengar, S. S. and R. Brooks, eds., Distributed Sensor Networks, CRC Press, 1995.
-
(1995)
-
-
Iyengar, S.S.1
Brooks, R.2
-
42
-
-
0001215802
-
Distributed sensor networks
-
Iyengar, S. S., R. L. Kayshyap, and R. N. Madan, Distributed sensor networks, IEEE Trans. Syst. Man Cyber. 21(5):1027-1031 (1991).
-
(1991)
IEEE Trans. Syst. Man Cyber.
, vol.21
, Issue.5
, pp. 1027-1031
-
-
Iyengar, S.S.1
Kayshyap, R.L.2
Madan, R.N.3
-
43
-
-
0003625287
-
Advances in Distributed Sensor Integration: Application and Theory
-
Prentice-Hall
-
Iyengar, S. S., L. Prasad, and H. Min, Advances in Distributed Sensor Integration: Application and Theory, Prentice-Hall, 1995.
-
(1995)
-
-
Iyengar, S.S.1
Prasad, L.2
Min, H.3
-
44
-
-
55849131440
-
Min loading max reusability fusion classifiers for sensor data model
-
Proc. 2nd Int. Conf. Sensor Technologies and Applications, SENSORCOMM '08, Aug. 25-31
-
Iyer, V., R. M. Garimella, Rama Murthy, and M. B. Srinivas, Min loading max reusability fusion classifiers for sensor data model, Proc. 2nd Int. Conf. Sensor Technologies and Applications, SENSORCOMM '08, Aug. 25-31, 2008, pp. 480-485.
-
(2008)
, pp. 480-485
-
-
Iyer, V.1
Garimella, R.M.2
Murthy, R.3
Srinivas, M.B.4
-
45
-
-
65249119695
-
FARMs: Fusionable ambient renewable MACs
-
Proc. IEEE Sensors Applications Symp. SAS 2009, Feb. 17-19
-
Iyer, V., S. S. Iyengar, N. Balakrishnan, V. Phoha, and M. B. Srinivas, FARMs: Fusionable ambient renewable MACs. Proc. IEEE Sensors Applications Symp. SAS 2009, Feb. 17-19, 2009, pp. 169-174.
-
(2009)
, pp. 169-174
-
-
Iyer, V.1
Iyengar, S.S.2
Balakrishnan, N.3
Phoha, V.4
Srinivas, M.B.5
-
46
-
-
70450230554
-
Multi-hop scheduling and local datalink aggregation dependent qos in modeling and simulation of power-aware wireless sensor networks
-
Proceedings of 2009. ACM-IWCMC, Leipzig, Germany
-
Iyer, V., S. S. Iyengar, G. Rama Murthy, M. B. Srinivas, and B. Hochet, Multi-hop scheduling and local datalink aggregation dependent qos in modeling and simulation of power-aware wireless sensor networks, Proceedings of 2009. ACM-IWCMC, Leipzig, Germany, 2009; pp. 844-848.
-
(2009)
, pp. 844-848
-
-
Iyer, V.1
Iyengar, S.S.2
Rama Murthy, G.3
Srinivas, M.B.4
Hochet, B.5
-
47
-
-
63049084593
-
C-error simulator for development for sensor and location-aware sensing applications
-
Proc. 3rd Int. Conf. Sensing Technology, ICST 2008, Nov. 30-Dec. 3
-
Iyer, V., G. Rama Murthy, M. B. Srinivas, and B. Hochet, C-error simulator for development for sensor and location-aware sensing applications, Proc. 3rd Int. Conf. Sensing Technology, ICST 2008, Nov. 30-Dec. 3, 2008, pp. 192-199.
-
(2008)
, pp. 192-199
-
-
Iyer, V.1
Rama Murthy, G.2
Srinivas, M.B.3
Hochet, B.4
-
48
-
-
50949127037
-
Training data compression algorithms and reliability in large wireless sensor networks
-
SUTC Proc. IEEE Int. Conf. Sensor Networks, Ubiquitous and Trustworthy Computing, June
-
Iyer, V., R. Murthy, M. B. Srivinas, and B. Hochet, Training data compression algorithms and reliability in large wireless sensor networks, SUTC Proc. IEEE Int. Conf. Sensor Networks, Ubiquitous and Trustworthy Computing, June 2008, pp. 480-485.
-
(2008)
, pp. 480-485
-
-
Iyer, V.1
Murthy, R.2
Srivinas, M.B.3
Hochet, B.4
-
49
-
-
50949127037
-
Training data compression algorithms and reliability in large wireless sensor networks
-
Proc. IEEE Int. Conf. Sensor Networks, Ubiquitous and Trustworthy Computing, June
-
Iyer, V., G. Rama Murthy, and M. B. Srinivas, Training data compression algorithms and reliability in large wireless sensor networks, Proc. IEEE Int. Conf. Sensor Networks, Ubiquitous and Trustworthy Computing, June 2008, pp. 480-485.
-
(2008)
, pp. 480-485
-
-
Iyer, V.1
Rama Murthy, G.2
Srinivas, M.B.3
-
50
-
-
84886681399
-
Environmental measurement OS for a tiny CRF-stack used in wireless network
-
(special issue)
-
Iyer, V., G. Rama Murthy, and M. B. Srinivas, Environmental measurement OS for a tiny CRF-stack used in wireless network, Modern Sensing Technol. (special issue) 90:72-86 (2008).
-
(2008)
Modern Sensing Technol.
, vol.90
, pp. 72-86
-
-
Iyer, V.1
Rama Murthy, G.2
Srinivas, M.B.3
-
51
-
-
79961213512
-
The Rice University Monarch Project
-
Technical Report, Rice Univ.
-
Johnson, D. B., The Rice University Monarch Project, Technical Report, Rice Univ., 2004.
-
(2004)
-
-
Johnson, D.B.1
-
52
-
-
46549091823
-
The NP-completeness column: An outgoing guide
-
Johnson, D. S., The NP-completeness column: An outgoing guide, J. Algorithms, 6:434-451 (1985).
-
(1985)
J. Algorithms
, vol.6
, pp. 434-451
-
-
Johnson, D.S.1
-
53
-
-
12744277812
-
Sub-grid based key vector assignment: A key pre-distribution scheme for distributed sensor networks
-
ICWN
-
Kalidindi, R., V. Parachuri, S. Basavaraju, C. Mallanda, A. Kulshrestha, L. Ray, R. Kannan, and A. Durresi, Sub-grid based key vector assignment: A key pre-distribution scheme for distributed sensor networks, ICWN, 2004.
-
(2004)
-
-
Kalidindi, R.1
Parachuri, V.2
Basavaraju, S.3
Mallanda, C.4
Kulshrestha, A.5
Ray, L.6
Kannan, R.7
Durresi, A.8
-
54
-
-
84893361489
-
Sub-grid based key vector assignment: A key pre-distribution scheme for distributed sensor networks
-
March
-
Kalidindi, R., R. Kannan, S. S. Iyengar, and A. Durresi, Sub-grid based key vector assignment: A key pre-distribution scheme for distributed sensor networks, J. Pervasive Comput. Communi. 2(1):35-43 (March 2006).
-
(2006)
J. Pervasive Comput. Communi.
, vol.2
, Issue.1
, pp. 35-43
-
-
Kalidindi, R.1
Kannan, R.2
Iyengar, S.S.3
Durresi, A.4
-
55
-
-
30344480889
-
Protocols and Architectures for Wireless Sensor Networks
-
John Wiley & Sons, Inc.
-
Karl, H. and A. Willig, Protocols and Architectures for Wireless Sensor Networks, John Wiley & Sons, Inc., 2005.
-
(2005)
-
-
Karl, H.1
Willig, A.2
-
56
-
-
84942426861
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
Proc. 1st Int. IEEE Workshop on Sensor Network Protocols and Applications, Univ. California, Berkeley
-
Karlof, C. and D. Wagner, Secure routing in wireless sensor networks: Attacks and countermeasures, Proc. 1st Int. IEEE Workshop on Sensor Network Protocols and Applications, Univ. California, Berkeley, 2003.
-
(2003)
-
-
Karlof, C.1
Wagner, D.2
-
57
-
-
84944216908
-
An approach to self adaptive software based on supervisory control
-
Proc. Int.Workshop on Self Adaptive Software
-
Karsai, G., A. Ledeczi, J. Sztipanovits, G. Peceli, G. Simon, and T. Kovacshazy, An approach to self adaptive software based on supervisory control, Proc. Int.Workshop on Self Adaptive Software, 2001.
-
(2001)
-
-
Karsai, G.1
Ledeczi, A.2
Sztipanovits, J.3
Peceli, G.4
Simon, G.5
Kovacshazy, T.6
-
58
-
-
4243121947
-
Efficient Parallel Algorithms for Planar, Chordal and Interval Graphs
-
Ph.D. thesis, MIT, Cambridge, MA
-
Klein, P. N., Efficient Parallel Algorithms for Planar, Chordal and Interval Graphs, Ph.D. thesis, MIT, Cambridge, MA, 1988.
-
(1988)
-
-
Klein, P.N.1
-
59
-
-
0024137117
-
Efficient parallel algorithms for chordal graphs
-
Proc. IEEE 29th Symp. Foundation of Computer Section
-
Klein, P. N., Efficient parallel algorithms for chordal graphs, Proc. IEEE 29th Symp. Foundation of Computer Section 1988, pp. 150-161.
-
(1988)
, pp. 150-161
-
-
Klein, P.N.1
-
60
-
-
0142194282
-
Supervisory control of partial specification arising in protocol conversion
-
Proc. 35th Allerton Conf. Communication, Control and Computing
-
Kumar, R. and M. Fabian, Supervisory control of partial specification arising in protocol conversion, Proc. 35th Allerton Conf. Communication, Control and Computing, 1997, pp. 543-552.
-
(1997)
, pp. 543-552
-
-
Kumar, R.1
Fabian, M.2
-
61
-
-
0003579605
-
Modeling and Control Logical Discrete Event Systems
-
Kluwer Academic
-
Kumar, R. and V. Garg, Modeling and Control Logical Discrete Event Systems, Kluwer Academic, 1995.
-
(1995)
-
-
Kumar, R.1
Garg, V.2
-
62
-
-
84973519652
-
A generic virus scanner in C++
-
Proc. 8th Computer Security Applications Conf.
-
Kumar, S. and E. H. Spafford, A generic virus scanner in C++, Proc. 8th Computer Security Applications Conf., 1992.
-
(1992)
-
-
Kumar, S.1
Spafford, E.H.2
-
63
-
-
49249110577
-
Simulation-based input loading condition optimisation of airport baggage handling systems
-
Proc. IEEE Intelligent Transportation Systems Conf., Seattle, WA
-
Le, V. T., D. Creighton, and S. Nahavandi, Simulation-based input loading condition optimisation of airport baggage handling systems, Proc. IEEE Intelligent Transportation Systems Conf., Seattle, WA 2007.
-
(2007)
-
-
Le, V.T.1
Creighton, D.2
Nahavandi, S.3
-
64
-
-
48349119837
-
Dynamic detection and classification of computer viruses using general behavior patterns
-
Proceedings of 5th Int. Virus Bulletin Conf. Sept.
-
LeCharlier, B. and M. Swimmer, Dynamic detection and classification of computer viruses using general behavior patterns, Proceedings of 5th Int. Virus Bulletin Conf. Sept. 1995, p. 75.
-
(1995)
, pp. 75
-
-
LeCharlier, B.1
Swimmer, M.2
-
65
-
-
85084163349
-
Data mining approaches for intrusion detection
-
Proc. 7th USENIX Security Symp. SECURITY '98, Jan.
-
Lee, W. and S. J. Stolfo, Data mining approaches for intrusion detection, Proc. 7th USENIX Security Symp. SECURITY '98, Jan. 1998.
-
(1998)
-
-
Lee, W.1
Stolfo, S.J.2
-
66
-
-
13644272420
-
The key design parameters of checked baggage security screening systems in airports
-
Leone, K. and R. Liu, The key design parameters of checked baggage security screening systems in airports, J. Air Transport Mgmt. 11:69-78 (2005).
-
(2005)
J. Air Transport Mgmt.
, vol.11
, pp. 69-78
-
-
Leone, K.1
Liu, R.2
-
67
-
-
25444507044
-
The Computer Virus Handbook
-
Osborne/McGraw-Hill
-
Levin, R. B., The Computer Virus Handbook, Osborne/McGraw-Hill, 1990.
-
(1990)
-
-
Levin, R.B.1
-
68
-
-
84923588929
-
TinyOs Programming
-
Cambridge Univ. Press
-
Levis, P. and D. Gay, TinyOs Programming, Cambridge Univ. Press, 2009.
-
(2009)
-
-
Levis, P.1
Gay, D.2
-
69
-
-
0004079280
-
An Introduction to Formal Languages and Automata
-
3rd ed., Jones & Barlett, Oct.
-
Linz, P., An Introduction to Formal Languages and Automata, 3rd ed., Jones & Barlett, Oct. 2000.
-
(2000)
-
-
Linz, P.1
-
70
-
-
84886652662
-
-
SUResearchGroup, LSU Sensor Simulator (LSU SenSim, version 1, Jan. 2005) User Manual, Dept. Computer Science, Louisiana State University, Baton Rouge
-
LSUResearchGroup, LSU Sensor Simulator (LSU SenSim, version 1, Jan. 2005) User Manual, Dept. Computer Science, Louisiana State University, Baton Rouge.
-
-
-
-
71
-
-
38549118210
-
Sensor Simulator: A Simulation Framework for Sensor Networks
-
master's thesis, Dept. of Computer Science, Louisiana State Univ., Baton Rouge
-
Mallanda, C., Sensor Simulator: A Simulation Framework for Sensor Networks, master's thesis, Dept. of Computer Science, Louisiana State Univ., Baton Rouge.
-
-
-
Mallanda, C.1
-
72
-
-
84944239503
-
Using finite automata to mine execution data for intrusion detection: A preliminary report
-
Michael, C. and A. Ghosh, Using finite automata to mine execution data for intrusion detection: A preliminary report, Lect Notes Comput Sci, 1907/2000:66-79(2000).
-
(1907)
Lect Notes Comput Sci
, pp. 66-79
-
-
Michael, C.1
Ghosh, A.2
-
73
-
-
0022678067
-
Distributed discrete-event simulation
-
March
-
Misra, J., Distributed discrete-event simulation, ACM Comput. Surveys 18(1):39-65 (March 1986).
-
(1986)
ACM Comput. Surveys
, vol.18
, Issue.1
, pp. 39-65
-
-
Misra, J.1
-
74
-
-
70449837908
-
Parallel algorithms for some computational problems
-
Moitra, A. and S. S. Iyengar, Parallel algorithms for some computational problems, Adv. Comput. 26:93-153 (1987).
-
(1987)
Adv. Comput.
, vol.26
, pp. 93-153
-
-
Moitra, A.1
Iyengar, S.S.2
-
75
-
-
0005946780
-
A process state-transition analysis and its application to intrusion detection
-
Proc. ACSAC1999
-
Nuansri, N., S. Singh, and T. S. Dillon, A process state-transition analysis and its application to intrusion detection, Proc. ACSAC1999, 1999, pp. 378-388.
-
(1999)
, pp. 378-388
-
-
Nuansri, N.1
Singh, S.2
Dillon, T.S.3
-
76
-
-
84886679695
-
-
OPNET Technolgies, Inc., Opnet Modeler.
-
OPNET Technolgies, Inc., Opnet Modeler. www.opnet.com
-
-
-
-
77
-
-
0034593011
-
Sensorsim: A simulation framework for sensor networks
-
Proc. 3rd ACM Int. DRAFT Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems
-
Park, S., A. Savvides, and M. B. Srivastava, Sensorsim: A simulation framework for sensor networks, Proc. 3rd ACM Int. DRAFT Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems, 2000, pp. 104-111.
-
(2000)
, pp. 104-111
-
-
Park, S.1
Savvides, A.2
Srivastava, M.B.3
-
78
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
Perrig, A., R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, Spins: Security protocols for sensor networks, Wireless Networks 8(5):521-534 (2002).
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
79
-
-
26444451023
-
Versatile low power media access for wireless sensor networks
-
Proc. 2nd Int. Conf. Embedded Networked Sensor Systems, SenSys '04, ACM, New York
-
Polastre, J., J. Hill, and D. Culler, Versatile low power media access for wireless sensor networks, Proc. 2nd Int. Conf. Embedded Networked Sensor Systems, SenSys '04, ACM, New York, 2004, pp. 95-107.
-
(2004)
, pp. 95-107
-
-
Polastre, J.1
Hill, J.2
Culler, D.3
-
80
-
-
0023104549
-
Supervisory control of a class of discrete event processes
-
Ramadge, P. J. andW. M.Wonham, Supervisory control of a class of discrete event processes, SIAM J. Control and Optim., 25(3):206-230 (1987).
-
(1987)
SIAM J. Control and Optim.
, vol.25
, Issue.3
, pp. 206-230
-
-
Ramadge, P.J.1
Wonham, W.M.2
-
81
-
-
84886655889
-
-
Research Integration: Platform Survey, embedded WiSeNts consortium
-
Research Integration: Platform Survey, embedded WiSeNts consortium.
-
-
-
-
82
-
-
45749132181
-
Z-mac: A Hybrid MAC for Wireless Sensor Networks
-
IEEE Press, Piscataway, NJ
-
Rhee I., A. Warrier, M. Aia, J. Min, and M. L. Sichitiu, Z-mac: A Hybrid MAC for Wireless Sensor Networks, 2008, IEEE Press, Piscataway, NJ, vol. 16, pp. 511-524.
-
(2008)
, vol.16
, pp. 511-524
-
-
Rhee, I.1
Warrier, A.2
Aia, M.3
Min, J.4
Sichitiu, M.L.5
-
83
-
-
34447266751
-
New developments in airport baggage handling systems
-
Rijsenbrij, J. C. and J. A. Ottjes, New developments in airport baggage handling systems, Transport. Plann. Technol. 30:417-430 (2007).
-
(2007)
Transport. Plann. Technol.
, vol.30
, pp. 417-430
-
-
Rijsenbrij, J.C.1
Ottjes, J.A.2
-
84
-
-
33644902124
-
Sensor development using Berkeley mote platform
-
Ruiz-Sandoval, M., T. Nagayama, and B. F. Spencer, Sensor development using Berkeley mote platform, J. Earthquake Eng., 10:289-309 (2006).
-
(2006)
J. Earthquake Eng.
, vol.10
, pp. 289-309
-
-
Ruiz-Sandoval, M.1
Nagayama, T.2
Spencer, B.F.3
-
85
-
-
1942468191
-
Smart space for automation
-
Sastry, S., Smart space for automation, Assembly Autom., 24(2):201-209 (2004).
-
(2004)
Assembly Autom.
, vol.24
, Issue.2
, pp. 201-209
-
-
Sastry, S.1
-
86
-
-
62749109404
-
Sensor technologies for future automation systems
-
Sastry, S., S. S. Iyengarand, and N. Balakrishnan, Sensor technologies for future automation systems, Sensor Lett. 2(1):9-17 (2004).
-
(2004)
Sensor Lett.
, vol.2
, Issue.1
, pp. 9-17
-
-
Sastry, S.1
Iyengarand, S.S.2
Balakrishnan, N.3
-
87
-
-
33745486852
-
Distributed Sensor Networks
-
CRC Press
-
Sastry, S. and S. S. Iyengar, Distributed Sensor Networks, CRC Press, 2005.
-
(2005)
-
-
Sastry, S.1
Iyengar, S.S.2
-
88
-
-
84886667224
-
A Taxonomy of Distributed Sensor Networks
-
CRC Press
-
Sastry, S. and S. S. Iyengar, A Taxonomy of Distributed Sensor Networks, CRC Press, 1995.
-
(1995)
-
-
Sastry, S.1
Iyengar, S.S.2
-
89
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
Proc. IEEE Symp. Security and Privacy, May
-
Schultz, M. G. and E. Eskin, et al., Data mining methods for detection of new malicious executables, Proc. IEEE Symp. Security and Privacy, May 2001.
-
(2001)
-
-
Schultz, M.G.1
Eskin, E.2
-
90
-
-
79961200300
-
A Simulation Framework for Sensor Networks in j-sim
-
Technical Report UIUCDCS-R2003-2386, Dept. Computer Science, Univ. Illinois, Urbana-Champaign, Nov.
-
Sobieh, A. and J. C. Hou, A Simulation Framework for Sensor Networks in j-sim, Technical Report UIUCDCS-R2003-2386, Dept. Computer Science, Univ. Illinois, Urbana-Champaign, Nov. 2003.
-
(2003)
-
-
Sobieh, A.1
Hou, J.C.2
-
91
-
-
84886662574
-
Dr. Solomon's PC Anti-virus Book
-
Newtech
-
Solomon, A. and T. Kay, Dr. Solomon's PC Anti-virus Book, Newtech, 1994.
-
(1994)
-
-
Solomon, A.1
Kay, T.2
-
92
-
-
33751527767
-
Trace: A tool for logging operating system call transaction
-
Oct.
-
Spinellis, D., Trace: A tool for logging operating system call transaction, Operating Syst. Rev. 28(4):56-63 (Oct. 1994).
-
(1994)
Operating Syst. Rev.
, vol.28
, Issue.4
, pp. 56-63
-
-
Spinellis, D.1
-
93
-
-
84886652345
-
C-error simulator for development for sensor and location aware sensing applications
-
Proc. 3rd Int. Conf. Sensing Technology, Taichung, Taiwan
-
Srinivas, M. B., V. Iyer, G. Rama Murthy, and B. Hochet, C-error simulator for development for sensor and location aware sensing applications, Proc. 3rd Int. Conf. Sensing Technology, Taichung, Taiwan, 2002, pp. 799-804.
-
(2002)
, pp. 799-804
-
-
Srinivas, M.B.1
Iyer, V.2
Rama Murthy, G.3
Hochet, B.4
-
95
-
-
0004141908
-
Computer Networks
-
Prentice-Hall
-
Tannenbaum, A. S., Computer Networks, Prentice-Hall, 2002.
-
(2002)
-
-
Tannenbaum, A.S.1
-
96
-
-
34548757611
-
Omnet++ Discrete Event Simulation System
-
version 2.3
-
Vargas, A., Omnet++ Discrete Event Simulation System, version 2.3, 2003.
-
(2003)
-
-
Vargas, A.1
-
97
-
-
84938685054
-
Survey on wireless sensor network devices
-
Proc. IEEE Conf. Emerging Technologies and Factory Automation, ETFA03
-
Vieira, M. A. M., D. C. da Silva Jr., C. N. Coelho Jr., and J. M. daMata, Survey on wireless sensor network devices, Proc. IEEE Conf. Emerging Technologies and Factory Automation, ETFA03, 2003, p. 1.
-
(2003)
, pp. 1
-
-
Vieira, M.A.M.1
Da Silva Jr., D.C.2
Coelho Jr., C.N.3
DaMata, J.M.4
-
98
-
-
84886706906
-
Supervisory control of workflow scheduling
-
Proc. Int. Workshop on Advanced Transaction Models and Architectures
-
Wallace, C., P. Jensen, and N. Soparkar, Supervisory control of workflow scheduling, Proc. Int. Workshop on Advanced Transaction Models and Architectures, 1996.
-
(1996)
-
-
Wallace, C.1
Jensen, P.2
Soparkar, N.3
-
99
-
-
0036793924
-
Denial of service in sensor networks
-
Oct.
-
Wood, A. and J. A. Stankovic, Denial of service in sensor networks, IEEE Comput. 35(10):54-62 (Oct. 2002).
-
(2002)
IEEE Comput.
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.1
Stankovic, J.A.2
-
100
-
-
0347559588
-
Introduction to Parallel Algorithms
-
Wiley
-
Xavier, C. and S. S. Iyengar, Introduction to Parallel Algorithms, Wiley, 1998.
-
(1998)
-
-
Xavier, C.1
Iyengar, S.S.2
-
101
-
-
34547398467
-
Ultra-low duty cycleMAC with scheduled channel polling, SenSys '06
-
Proc. 4th Int. Conf. Embedded Networked Sensor Systems, ACM, NewYork
-
Ye,W., F. Silva, and J. Heidemann, Ultra-low duty cycleMAC with scheduled channel polling, SenSys '06, Proc. 4th Int. Conf. Embedded Networked Sensor Systems, ACM, NewYork, 2006, pp. 321-334.
-
(2006)
, pp. 321-334
-
-
Ye, W.1
Silva, F.2
Heidemann, J.3
-
102
-
-
0003405130
-
Geographical and Energy Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks
-
Technical Report, Aug.
-
Yu, Y., R. Govindan, and D. Estrin, Geographical and Energy Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks, Technical Report, Aug. 2001.
-
(2001)
-
-
Yu, Y.1
Govindan, R.2
Estrin, D.3
-
103
-
-
0031652485
-
Glomosim: A library for parallel simulation of largescale wireless networks
-
Proc. Workshop on Parallel and Distributed Simulation
-
Zeng, X., R. Bagrodia, and M. Gerla, Glomosim: A library for parallel simulation of largescale wireless networks, Proc. Workshop on Parallel and Distributed Simulation, 1998, pp. 154-161.
-
(1998)
, pp. 154-161
-
-
Zeng, X.1
Bagrodia, R.2
Gerla, M.3
-
104
-
-
85013867986
-
-
ZigBee Wireless Networking, Newnes Publications, 2008
-
ZigBee Wireless Networking, Newnes Publications, 2008.
-
-
-
|