ERA users may experience an intermittent Deposit/Save error. We apologize for any inconvenience this may cause. Thank you for your patience while we work to resolve the issue. When the work is completed, we'll remove this notice.
Technical Reports (Computing Science)
Technical Reports Collection
Items in this Collection
- 2MacGregor, Mike
- 2Malhotra, Baljeet
- 2Nascimento, Mario
- 2Nikolaidis, Ioanis
- 1Chvets, I.
- 1Coman, Alexandru
Technical report TR05-08. We study the problem of visualizing large networks and develop techniques for effectively abstracting a network and reducing the size to a level that can be clearly viewed. Our size reduction techniques are based on sampling, where only a sample instead of the full...
Technical report TR08-04. There are many network intrusion detection and prevention tools available to the network administrator of today, but Snort has become an enterprise standard due to its open source nature and also due to the fact that there are many open source operating systems which...
Technical report TR08-02. We consider the problem of vehicle classification using acoustic signals captured within a sensor network. The sensors perform collaborative decision and/or data fusion in a distributed and energy efficient manner. We present a distributed cluster-based algorithm,...
Technical report TR02-04. As the amount of traffic carried by the Internet grows, the rate at which packets must be processed at each router and switch in the network also increases. The results of routing table lookups can be cached in order to accommodate this increasing deamand for fast...
Technical report TR05-23. Wireless sensor networks are made of autonomous devices that are able to collect information, store it, process it and share it with other devices. Such framework can be used to efficiently query spatiotemporal data, e.g., for monitoring humidity and temperature levels...
Technical report TR09-01. Finding the top-k values is an important type of aggregation query in wireless sensor networks. Previous proposals relied on a given underlying logical tree topology for data aggregation/forwarding, but did not pay due attention to the role of such topology. In this...
We identify 13 problems whose solutions can significantly enhance our ability to design and analyze firewalls and other packet classifiers. These problems include the firewall equivalence problem, the firewall redundancy problem, the firewall verification problem, and the firewall completeness...
Technical report TR09-12. Optimal utility-based congestion control is an optimization approach to congestion control problems where the objective is to maximize the aggregate source utility over their transmission rates. It has been used to analyze Internet congestion control schemes. In this...