Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Computer Engineering

Distributed Cluster-Based Outlier Detection In Wireless Sensor Networks, Swetha Gali Oct 2007

Distributed Cluster-Based Outlier Detection In Wireless Sensor Networks, Swetha Gali

Electrical & Computer Engineering Theses & Dissertations

Wireless sensor networks find several potential applications in a variety of fields, such as environmental monitoring and control, battlefields, surveillance, smart buildings, human health monitoring, etc. These sensor networks consist of a large number of very tiny, inexpensive, and low power sensor nodes, which are deployed in a variety of harsh environments that may result in the sensor data getting corrupted. It is thus critical to detect and report these abnormal values in the sensor data, in order to have a better understanding of the monitored environment. Detection of the abnormal values is of special interest for the sensor network …


Lazy Preservation: Reconstructing Websites From The Web Infrastructure, Frank Mccown Oct 2007

Lazy Preservation: Reconstructing Websites From The Web Infrastructure, Frank Mccown

Computer Science Theses & Dissertations

Backup or preservation of websites is often not considered until after a catastrophic event has occurred. In the face of complete website loss, webmasters or concerned third parties have attempted to recover some of their websites from the Internet Archive. Still others have sought to retrieve missing resources from the caches of commercial search engines. Inspired by these post hoc reconstruction attempts, this dissertation introduces the concept of lazy preservation{ digital preservation performed as a result of the normal operations of the Web Infrastructure (web archives, search engines and caches). First, the Web Infrastructure (WI) is characterized by its preservation …


Channel Management In Heterogeneous Cellular Networks, Mohammad Hadi Arbabi Aug 2007

Channel Management In Heterogeneous Cellular Networks, Mohammad Hadi Arbabi

Computer Science Theses & Dissertations

Motivated by the need to increase system capacity in the face of tight FCC regulations, modem cellular systems are under constant pressure to increase the sharing of the frequency spectrum among the users of the network.

Key to increasing system capacity is an efficient channel management strategy that provides higher capacity for the system while, at the same time, providing the users with Quality of Service guarantees. Not surprisingly, dynamic channel management has become a high profile topic in wireless communications. Consider a highly populated urban area, where mobile traffic loads are increased due to highway backups or sporting events. …


Detecting Compromised Nodes In Wireless Sensor Networks, Mary Lisa Mathews Apr 2007

Detecting Compromised Nodes In Wireless Sensor Networks, Mary Lisa Mathews

Electrical & Computer Engineering Theses & Dissertations

While wireless sensor networks are proving to be a versatile tool, many of the applications in which they are utilized have sensitive data. Therefore, security is crucial in many of these applications. Once a sensor node has been compromised, the security of the network degrades quickly if measures are not taken to deal with this event. There have been many approaches researched to tackle the issue. In this thesis, an anomaly-based intrusion detection protocol is developed to detect compromised nodes in wireless sensor networks.

The proposed protocol is implemented after the sensors are deployed into the environment in which they …


Performance Analysis Of Ieee 802.11b Devices In The Presence Of Interference Aware Scheduling-Adaptive Frequency Hopping Enabled Bluetooth Devices, Deepthi Gopalpet Apr 2007

Performance Analysis Of Ieee 802.11b Devices In The Presence Of Interference Aware Scheduling-Adaptive Frequency Hopping Enabled Bluetooth Devices, Deepthi Gopalpet

Electrical & Computer Engineering Theses & Dissertations

Wireless Local Area networks (WLAN) and Wireless Personal Area Networks (WPAN) provide complimentary services using the same unlicensed radio frequency band of operation. The 802.11b WLAN operates in the 2.4 GHz band and uses a Direct Sequence Spread Spectrum technique. It is designed to cover large areas ranging up to 100 meters in diameter, which may connect hundreds of computers. Bluetooth (BT) WPAN also operates in the same frequency band as the IEEE 802.lib and it uses a Frequency Hopping Spread Spectrum technique. BT is primarily used for communications between notebooks, palm units and other personal computing devices within relatively …


Applying The Levels Of Conceptual Interoperability Model In Support Of Integratability, Interoperability, And Composability For System-Of-Systems Engineering, Andreas Tolk, Saikou Y. Diallo, Charles D. Turnitsa Jan 2007

Applying The Levels Of Conceptual Interoperability Model In Support Of Integratability, Interoperability, And Composability For System-Of-Systems Engineering, Andreas Tolk, Saikou Y. Diallo, Charles D. Turnitsa

Computational Modeling & Simulation Engineering Faculty Publications

The Levels of Conceptual Interoperability Model (LCIM) was developed to cope with the different layers of interoperation of modeling & simulation applications. It introduced technical, syntactic, semantic, pragmatic, dynamic, and conceptual layers of interoperation and showed how they are related to the ideas of integratability, interoperability, and composability. The model was successfully applied in various domains of systems, cybernetics, and informatics.


Optimal Layout Of Multicast Groups Using Network Embedded Multicast Security In Ad Hoc Sensor Networks, Richard R. Brooks, Brijesh Pillai, Michele C. Weigle, Matthew Pirretti Jan 2007

Optimal Layout Of Multicast Groups Using Network Embedded Multicast Security In Ad Hoc Sensor Networks, Richard R. Brooks, Brijesh Pillai, Michele C. Weigle, Matthew Pirretti

Computer Science Faculty Publications

This paper considers the security of sensor network applications. Our approach creates multicast regions that use symmetric key cryptography for communications. Each multicast region contains a single keyserver that is used to perform key management and maintain the integrity of a multicast region. Communications between two multicast regions is performed by nodes that belong to both regions. To ease the network management burden, it is desirable for the networks to self-organize into regions and dynamically select their keyservers. This paper shows how to determine the number of keyservers (k) to use and the size in the number of hops (h) …