enter search term and/or author name
Adaptive correctness monitoring for wireless sensor networks using hierarchical distributed run-time invariant checking
Douglas Herbert, Vinaitheerthan Sundaram, Yung-Hsiang Lu, Saurabh Bagchi, Zhiyuan Li
Article No.: 8
This article presents a hierarchical approach for detecting faults in wireless sensor networks (WSNs) after they have been deployed. The developers of WSNs can specify “invariants” that must be satisfied by the WSNs. We present a...
Network intrusion detection through Adaptive Sub-Eigenspace Modeling in multiagent systems
Mei-Ling Shyu, Thiago Quirino, Zongxing Xie, Shu-Ching Chen, Liwu Chang
Article No.: 9
Recently, network security has become an extremely vital issue that beckons the development of accurate and efficient solutions capable of effectively defending our network systems and the valuable information journeying through them. In this...
The role of roles in supporting reconfigurability and fault localizations for open distributed and embedded systems
Shangping Ren, Yue Yu, Nianen Chen, Jeffrey J.-P. Tsai, Kevin Kwiat
Article No.: 10
One of the main characteristics of open distributed embedded systems is that the involved entities are often very dynamic—different individual entities may join or leave the systems frequently. Therefore, systems built of these dynamic...
A large number of peer processes are distributed in a peer-to-peer (P2P) overlay network. It is difficult, maybe impossible for a peer to perceive the membership and location of every resource object due to the scalability and openness of a P2P...