Now showing items 31-40 of 54
Time synchronization algorithms based on Timing-sync Protocol in Wireless Sensor Networks
Wireless Sensor Networks(WSN) are large scale networks of sensors running on wireless environment. For an application running on a WSN, gathered data by the sensors are time critical in most of the cases. However, almost ...
Firewall configuration management using XACML policies
A collection of slides from the author's conference presentation is given.
Learning styles diagnosis based on learner behaviors in web based learning
Individuals have different backgrounds, motivation and preferences in their own learning processes. Web-based systems that ignore these differences have difficulty in meeting learners' needs effectively. One of these ...
An architecture for verification of access control policies with multi agent system ontologies
Multi-agent systems (MAS) which communicate with intra-domain and inter-domain agent platforms have access control requirements. Instead of a central mechanism, a fine-graned access control mechanism could have been applied ...
GUI-based testing of boundary overflow vulnerability
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or access to stored data. In order to countermeasure ...
An extension of ontology based databases to handle preferences
Ontologies have been defined to make explicit the semantics of data. With the emergence of the SemanticWeb, the amount of ontological data (or instances) available has increased. To manage such data, Ontology Based DataBases ...
The 1st workshop on model-based verification & validation: Directed acyclic graph modeling of security policies for firewall testing
Currently network security of institutions highly depend on firewalls, which are used to separate untrusted network from trusted one by enforcing security policies. Security policies used in firewalls are ordered set of ...
The effects of estrogen, progesterone, and C-erbB-2 receptor states on 18F-FDG uptake of primary breast cancer lesions
(Society of Nuclear Medicine Inc., 2007-08)
The purpose of this prospective study was to investigate whether correlations exist between 18F-FDG uptake of primary breast cancer lesions and predictive and prognostic factors such as estrogen receptor (ER), progesterone ...
Performance evaluation of cluster-based target tracking protocols for wireless sensor networks
Target tracking is an important application type for wireless sensor networks (WSN). Recently, various approaches [1-11] are proposed to maintain the accurate tracking of the targets as well as low energy consumption. ...
Event-based input validation using design-by-contract patterns
This paper proposes an approach for validation of numerical inputs based on graphical user interfaces (GUI) that are modeled and specified by event sequence graphs (ESG). For considering complex structures of input data, ...