Security protocols for wireless sensor network are designed to provide a variety of security services to secure communications in an unsafe network. It is demanded to verify whether an implementation of a security pro...
详细信息
It has been proved that Asymmetric cryptography can be used in Wireless Sensor networks (WSNs). In this paper, we propose a secure Identity-based routing protocol, which can ensure that the nodes in routing discovery ...
详细信息
Optimizing the hypervolume indicator within evolutionary multiobjective optimizers has become popular in the last years. Recently, the indicator has been generalized to the weighted case to incorporate various user pr...
详细信息
ISBN:
(纸本)9781605583259
Optimizing the hypervolume indicator within evolutionary multiobjective optimizers has become popular in the last years. Recently, the indicator has been generalized to the weighted case to incorporate various user preferences into hypervolume-based search algorithms. There are two main open questions in this context: (i) how does the specified weight influence the distribution of a fixed number of points that maximize the weighted hypervolume indicator? (ii) how can the user articulate her preferences easily without specifying a certain weight distribution function? In this paper, we tackle both questions. First, we theoretically investigate optimal distributions of μ points that maximize the weighted hypervolume indicator. Second, based on the obtained theoretical results, we propose a new approach to articulate user preferences within biobjective hypervolume-based optimization in terms of specifying a desired density of points on a predefined (imaginary) Pareto front. Within this approach, a new exact algorithm based on dynamic programming is proposed which selects the set of μ points that maximizes the (weighted) hypervolume indicator. Experiments on various test functions show the usefulness of this new preference articulation approach and the agreement between theory and practice. Copyright 2009 ACM.
Anomaly detection methods typically operate on preprocessed traffic traces. Firstly, most traffic capturing devices today employ random packet sampling, where each packet is selected with a certain probability, to cop...
详细信息
The goal of the study presented in this work is to evaluate the performance of MIMO-WCDMA networks in spatial multiplexing transmission mode. In this context, different bit streams are transmitted from each transmit a...
详细信息
In this paper, we introduce a model called regular state machines (RSMs) that characterizes a class of state transition systems with regular transition behavior. It turns out that many process graph models such as syn...
详细信息
In this paper, we introduce a model called regular state machines (RSMs) that characterizes a class of state transition systems with regular transition behavior. It turns out that many process graph models such as synchronous dataflow graphs and Petri nets have a state transition system that may be described and analyzed in the RSM *** particular, the proposed approach unifies methods known for the above-mentioned subclasses and yields new results concerning boundedness, deadlocks, scheduling, and formal verification.
In this paper, we present the design of our prototype of an automated real-time and affordable pollen sensing system. The design consists of three main subsystems: (1) a trap with automatic filtering, (2) a particle c...
详细信息
Experiments under controlled radio interference are crucial to assess the robustness of low-power wireless protocols. While tools such as Jamlab augment existing sensornet testbeds with realistic interference, it rema...
ISBN:
(纸本)9781450331432
Experiments under controlled radio interference are crucial to assess the robustness of low-power wireless protocols. While tools such as Jamlab augment existing sensornet testbeds with realistic interference, it remains an error-prone and time-consuming task to manually select the set of nodes acting as jammers and their individual transmit powers. We present an automated configuration approach based on simulated annealing to overcome this problem. A preliminary evaluation based on two testbeds shows that our approach can find near-optimal solutions within at most a few hours. We believe our approach can facilitate the widespread adoption of controlled interference experiments by the sensornet community.
Since biometric data are unique and permanent characteristics of individuals, the privacy protection of biometric authentication schemes has become a common concern of the public. Recently, Tang et al. proposed a biom...
详细信息
暂无评论