نتایج جستجو برای: wids

تعداد نتایج: 31  

2005
Shiding Lin Aimin Pan Zheng Zhang Rui Guo Zhenyu Guo

Faced with a proliferation of distributed systems in research and production groups, we have devised the WiDS ecosystem of technologies to optimize the development and testing process for such systems. WiDS optimizes the process of developing an algorithm, testing its correctness in a debuggable environment, and testing its behavior at large scales in a distributed simulation. We have developed...

Journal: :IEEE Trans. Reliability 2003
Shiuh-Pyng Shieh Yea-Ching Tsai Yu-Lun Huang

The ( ) wireless information dispersal scheme (WIDS) is useful for fault-tolerant parallel wireless communications, where it can be used to tolerate up to path (subchannel) failures. This paper constructs a performance model of ( ) WIDS used in wireless communications, and proposes an algorithm to find the optimal set of ( ) with the highest reliability. This algorithm reduces the complexity of...

2012
Khalid Nasr Anas Abou El Kalam Christian Fraboul

Openness of wireless communication medium and flexibility in dealing with wireless communication protocols and their vulnerabilities create a problem of poor security. Due to deficiencies in the security mechanisms of the first line of defense such as firewall and encryption, there are growing interests in detecting wireless attacks through a second line of defense in the form of Wireless Intru...

2014
Ira Ray Jenkins Sergey Bratus Travis Goodspeed Ryan Speers David Dowd

Producing IEEE 802.15.4 PHY-frames reliably accepted by some digital radio receivers, but rejected by others—depending on the receiver chip’s make and model—has strong implications for wireless security. Attackers could target specific receivers by crafting “shaped charges,” attack frames that appear valid to the intended target and are ignored by all other recipients. By transmitting in the un...

2007
Xuezheng Liu Wei Lin Aimin Pan Zheng Zhang

Despite many efforts, the predominant practice of debugging a distributed system is still printf-based log mining, which is both tedious and error-prone. In this paper, we present WiDS Checker, a unified framework that can check distributed systems through both simulation and reproduced runs from real deployment. All instances of a distributed system can be executed within one simulation proces...

Journal: :Jurnal Informatika: Jurnal Pengembangan IT 2023

The rapid development of wireless network technology has an impact with a significant increase users. Wi-Fi is one the technologies that currently used widely by humans as medium transmission to exchange information. increasing in number users directly proportional risk crime occurring. In this case attack on aimed at taking certain advantage user or it’s victim was done threatening aspects inf...

2016
Katrine Lundager Behzad Zeinali Mohammad Tohidi Jens K. Madsen Farshad Moradi Chao Lu

With the fast progress in miniaturization of sensors and advances in micromachinery systems, a gate has been opened to the researchers to develop extremely small wearable/implantable microsystems for different applications. However, these devices are reaching not to a physical limit but a power limit, which is a critical limit for further miniaturization to develop smaller and smarter wearable/...

Journal: :Journal of strength and conditioning research 2009
Benjamin R Wakefield Mark Glaister

The purpose of this study was to examine the effect of work-interval duration (WID) and intensity on the time spent at, or above, 95% VO2max (T95 VO2max) during intermittent bouts of supramaximal exercise. Over a 5-week period, 7 physically active men with a mean (+/-SD) age, height, body mass, and VO2max of 22 +/- 5 years, 181.5 +/- 5.6 cm, 86.4 +/- 11.4 kg, and 51.5 +/- 1.5 ml.kg-1.min-1, res...

2014
Ira Ray Jenkins Rebecca Shapiro Sergey Bratus Ryan Speers Travis Goodspeed

We present a reliable method of PHY-layer fingerprinting of IEEE 802.15.4-conformant nodes with commodity digital radio chips widely used in building inexpensive IEEE 802.15.4-conformant devices. Typically, PHY-layer fingerprinting requires software-defined radios that cost orders of magnitude more than the chips they can fingerprint; our method does not require a software-defined radio and use...

Journal: :CoRR 2013
Ibrahim AlShourbaji Rafat AlAmeer

The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security,the wireless networks have changed the way business, organizations work and offered a new range of possibilities and flexibilities; It is clear that wireless solutions are transforming the way we work and live. Employees are able to keep in touch with their e-mail, calend...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید