Works Published in 2012

search works

Displaying works 161 - 180 of 202 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2012 conference paper

Enhanced wireless channel authentication using time-synched link signature

2012 Proceedings IEEE infocom, 2636–2640.

By: Y. Liu n & P. Ning n

TL;DR: A novel construction for wireless link signature is proposed, called time-synched link signature, by integrating cryptographic protection and time factor into traditional wireless link signatures, to defend against the mimicry attack. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

2012 conference paper

Efficient Intranode communication in GPU-accelerated systems

Ieee international symposium on parallel and distributed processing, 1838–1847.

By: F. Ji, A. Aji, J. Dinan, D. Buntinas, P. Balaji, W. Feng, X. Ma

Source: NC State University Libraries
Added: August 6, 2018

2012 article

Dissecting Android Malware: Characterization and Evolution

2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), pp. 95–109.

By: Y. Zhou n & X. Jiang n

author keywords: Android malware; smartphone security
TL;DR: Systematize or characterize existing Android malware from various aspects, including their installation methods, activation mechanisms as well as the nature of carried malicious payloads reveal that they are evolving rapidly to circumvent the detection from existing mobile anti-virus software. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2012 article

Combining Partial Redundancy and Checkpointing for HPC

2012 IEEE 32ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), pp. 615–626.

TL;DR: This work contributes a model and analyzes the benefit of C/R in coordination with redundancy at different degrees to minimize the total wallclock time and resources utilization of HPC applications and conducts experiments with an implementation of redundancy within the MPI layer on a cluster. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2012 journal article

Choice as a Principle in Network Architecture

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 42(4), 105–106.

author keywords: Design; network architecture; innovation; economics
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (Web of Science; OpenAlex)
Sources: Web Of Science, ORCID, NC State University Libraries
Added: August 6, 2018

2012 conference paper

BitTrickle: Defending against broadband and high-power reactive jamming attacks

2012 Proceedings IEEE infocom, 909–917.

By: Y. Liu n & P. Ning n

TL;DR: BitTrickle is proposed, an anti-jamming wireless communication scheme that allows communication in the presence of a broadband and high power reactive jammer by exploiting the reaction time of the jammer. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2012 conference paper

A Byzantine attack defender: The Conditional Frequency Check

2012 ieee international symposium on information theory proceedings (isit).

By: X. He n, H. Dai n & P. Ning n

TL;DR: A new malicious user detection method based on two proposed Conditional Frequency Check statistics is developed with a Markovian spectrum model that can achieve high malicious users detection accuracy in the presence of arbitrary percentage of malicious users, and thus significantly improves collaborative spectrum sensing performance. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2012 journal article

Who's Watching Your Food? A Flexible Framework for Public Health Monitoring

TRANSACTIONS IN GIS, 16(2), 89–104.

By: S. Supak n, H. Luo n, L. Tateosian n, K. Fang n, J. Harrell*, C. Harrelson*, A. Bailey*, H. Devine n

TL;DR: A web-based GIS framework is developed which is applied to public health data for North Carolina's (NC) Department of Health and Human Services and delivers a web‐based mapping tool that is flexible and Open Source. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2012 journal article

Semantically rich application-centric security in Android

SECURITY AND COMMUNICATION NETWORKS, 5(6), 658–673.

By: M. Ongtang*, S. McLaughlin*, W. Enck n & P. McDaniel*

author keywords: security; android; smartphones
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2012 journal article

Self-sustaining, efficient and forward-secure cryptographic constructions for Unattended Wireless Sensor Networks

AD HOC NETWORKS, 10(7), 1204–1220.

By: A. Yavuz* & P. Ning*

author keywords: Applied cryptography; Unattended Wireless Sensor Networks (UWSNs); Digital signatures; Forward security; Aggregate signatures
TL;DR: This paper proposes a new class of cryptographic schemes, referred to as Hash-BasedSequentialAggregate andForwardSecureSignature (HaSAFSS), which allows a signer to sequentially generate a compact, fixed-size, and publicly verifiable signature efficiently. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2012 journal article

Platys Social: Relating Shared Places and Private Social Circles

IEEE INTERNET COMPUTING, 16(3), 53–59.

By: P. Murukannaiah n & M. Singh n

Contributors: P. Murukannaiah n & M. Singh n

TL;DR: Platys Social is a novel approach that learns users' social circles and prioritizes their connections by bringing together contextual information and user interactions. (via Semantic Scholar)
Sources: Web Of Science, ORCID, NC State University Libraries
Added: August 6, 2018

2012 journal article

Local construction of spanners in the 3D space

IEEE Transactions on Mobile Computing, 11(7), 1140–1150.

By: J. Jenkins, I. Kanj, G. Xia & F. Zhang

Source: NC State University Libraries
Added: August 6, 2018

2012 journal article

Functional Annotation of Hierarchical Modularity

PLOS ONE, 7(4).

MeSH headings : Algorithms; Cluster Analysis; Computational Biology / methods; Databases, Factual; Metabolic Networks and Pathways; Protein Interaction Mapping; Saccharomyces cerevisiae / genetics; Saccharomyces cerevisiae / metabolism; Saccharomyces cerevisiae Proteins / genetics; Saccharomyces cerevisiae Proteins / metabolism
TL;DR: The complementary method provides the hierarchical functional annotation of the modules and their hierarchically organized components by directly incorporating the functional taxonomy information into the hierarchy search process and by allowing multi-functional genes to be part of more than one component in the hierarchy. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2012 journal article

Tractable XML data exchange via relations

FRONTIERS OF COMPUTER SCIENCE, 6(3), 243–263.

By: R. Chirkova n, L. Libkin* & J. Reutter*

author keywords: data exchange; XML; XML shredding; inlining
TL;DR: A set of five requirements that must be fulfilled in order to have a faithful representation of the XML data-exchange problem by a relational translation are isolated and it is demonstrated that these requirements naturally suggest the in-lining technique for data-Exchange tasks. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2012 journal article

Reports on the 2011 AAAI Fourth Artificial Intelligence for Interactive Digital Entertainment Conference Workshops

AI MAGAZINE, 33(1), 55–56.

By: D. Elson*, J. Rowe n, A. Smith*, G. Smith* & E. Tomai

TL;DR: The Seventh Artificial Intelligence for Interactive Digital Entertainment Conference (AIIDE-11) was held October 11–14, 2011 at Stanford University, Stanford, California and the highlights of each workshop are presented. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2012 journal article

Interval-based flow watermarking for tracing interactive traffic

COMPUTER NETWORKS, 56(5), 1646–1665.

author keywords: Intrusion tracing; Stepping stones; Flow watermarking; Flow correlation
TL;DR: This paper presents a new method of embedding a watermark in traffic timing, for purposes of tracing the traffic in the presence of flow splitting, chaff packets, timing perturbation, and repacketization, which has been implemented and tested on a large number of SSH traffic flows. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2012 journal article

SLAW: Self-Similar Least-Action Human Walk

IEEE-ACM TRANSACTIONS ON NETWORKING, 20(2), 515–529.

By: K. Lee n, S. Hong*, S. Kim*, I. Rhee n & S. Chong*

author keywords: Delay-tolerant network; human mobility; Levy walk; mobile ad hoc network; mobile network; mobility model
TL;DR: The main contribution of this paper is to present a mobility model called Self-similar Least-Action Walk (SLAW) that can produce synthetic mobility traces containing all the five statistical features in various mobility settings including user-created virtual ones for which no empirical information is available. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2012 journal article

Intrusion Detection Models Based on Data Mining

INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 5(1), 30–38.

By: G. Mao, X. Wu & X. Jiang*

author keywords: Intrusion detection; data mining; frequency pattern; tree pattern
TL;DR: Experimental results show that FP has good performances in training and detecting intrusions from short system-call sequences, and TP can achieve a high detection precision in han... (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2012 journal article

IEEE 802.11 Saturation Throughput Analysis in the Presence of Hidden Terminals

IEEE-ACM TRANSACTIONS ON NETWORKING, 20(2), 557–570.

By: B. Jang n & M. Sichitiu n

author keywords: CSMA/CA; hidden terminal; IEEE 802.11; infrastructure case; RTC/CTS; saturation throughput
TL;DR: An accurate new analytical saturation throughput model for the infrastructure case of IEEE 802.11 in the presence of hidden terminals is presented and simulation results show that the model is accurate in a wide variety of cases. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2012 article

Special Issue: Selected Papers from the Fourth International IEEE Symposium on Advanced Networks and Telecommunication Systems (IEEE ANTS 2010)

Mukherjee, B., Dutta, R., Sivalingam, K., Vokkarane, V., & Jukan, A. (2012, April). OPTICAL SWITCHING AND NETWORKING, Vol. 9, pp. 145–146.

By: B. Mukherjee, R. Dutta*, K. Sivalingam, V. Vokkarane & A. Jukan

TL;DR: The Fourth International Symposium on Advanced Networks and Telecommunication Systems (ANTS) was held in Mumbai, India, during December 16–18, 2010, and addressed the challenge of improving the flexibility and efficiency of hybrid PONs using Wavelength Selective Switches. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.