Skip to main content
    ... 2) [t]: Timestamp of when the event took place. 3) [SID]: Segment Identifier is the hash value of the data segment using SHA-256. 4) [NID]: The identifier of reporting node, which should be unique across the whole community. 5) [MSG... more
    ... 2) [t]: Timestamp of when the event took place. 3) [SID]: Segment Identifier is the hash value of the data segment using SHA-256. 4) [NID]: The identifier of reporting node, which should be unique across the whole community. 5) [MSG SEG]: The actual message segment. ...
    Abstract— Wireless Sensor Networks (WSNs) operate with varying duty cycles to meet their application-specific criteria such as the availability, reliability, and the life expectancy of the system. This variation in duty cycle consequently... more
    Abstract— Wireless Sensor Networks (WSNs) operate with varying duty cycles to meet their application-specific criteria such as the availability, reliability, and the life expectancy of the system. This variation in duty cycle consequently affects the system characteristics ...
    The growth in use of medical imaging resulted in great challenges, such as handling, storing, retrieving and transmitting biomedical images. The Health Information Technology for Economic and Clinical Health (HITECH) Act went into effect... more
    The growth in use of medical imaging resulted in great challenges, such as handling, storing, retrieving and transmitting biomedical images. The Health Information Technology for Economic and Clinical Health (HITECH) Act went into effect in February 2010 [1]. The ...
    Abstract The explosion of medical image usage in clinical and research domains brings us a great challenge of securely handling, storing, retrieving and transmitting biomedical images. Medical images are often large files and they have to... more
    Abstract The explosion of medical image usage in clinical and research domains brings us a great challenge of securely handling, storing, retrieving and transmitting biomedical images. Medical images are often large files and they have to be stored for a long time if they are ...
    Japanese Embassy. The transmission began at 1:28 am and was complete by 1:37 am At 7:58 am an alert was raised, “Air Raid, Pearl Harbor. This is Not a Drill!” A few hours later, the American Pacific Fleet lay decimated (Kahn, 1967).... more
    Japanese Embassy. The transmission began at 1:28 am and was complete by 1:37 am At 7:58 am an alert was raised, “Air Raid, Pearl Harbor. This is Not a Drill!” A few hours later, the American Pacific Fleet lay decimated (Kahn, 1967). American code breakers, having gained techni- ...
    4.5 Quality of Service in Packet-Switched Networks Stan McClellan and Remzi Seker This chapter discusses several technologies and concepts that are important in the provisioning of" Quality of Service"(QoS) in... more
    4.5 Quality of Service in Packet-Switched Networks Stan McClellan and Remzi Seker This chapter discusses several technologies and concepts that are important in the provisioning of" Quality of Service"(QoS) in packet-switched networks. Unfortunately," QoS" is an overloaded term ...
    Abstract—Large-scale organizations often use role-based hi-erarchical systems for managing human resources. Meanwhile, secure communication is an essential element in protecting an organization's intellectual property. In this... more
    Abstract—Large-scale organizations often use role-based hi-erarchical systems for managing human resources. Meanwhile, secure communication is an essential element in protecting an organization's intellectual property. In this paper, we propose a solution to ...
    Abstract – The existing definitions for infrastructure notion do not seem to completely capture its impact, outreach, and the importance of entities it represents. Thorough understanding of the concept is necessary if we are to develop... more
    Abstract – The existing definitions for infrastructure notion do not seem to completely capture its impact, outreach, and the importance of entities it represents. Thorough understanding of the concept is necessary if we are to develop long-lasting adaptive infrastructures, which ...
    Abstract Efforts to integrate independently developed software components, to a large extent, have not been successful. Effective integration requires that component models agree on at least two different levels: “wiring”-level... more
    Abstract Efforts to integrate independently developed software components, to a large extent, have not been successful. Effective integration requires that component models agree on at least two different levels: “wiring”-level connectivity and semantic-level compatibility. ...
    Abstract—Building a secure group communication system is an active research topic. Several studies have focused on achieving a good level of privacy among a group of people via agreement on a shared encryption key. However, there is not... more
    Abstract—Building a secure group communication system is an active research topic. Several studies have focused on achieving a good level of privacy among a group of people via agreement on a shared encryption key. However, there is not much work published on easily ...
    Abstract – The existing definitions for infrastructure notion do not seem to completely capture its impact, outreach, and the importance of entities it represents. Thorough understanding of the concept is necessary if we are to develop... more
    Abstract – The existing definitions for infrastructure notion do not seem to completely capture its impact, outreach, and the importance of entities it represents. Thorough understanding of the concept is necessary if we are to develop long-lasting adaptive infrastructures, which ...
    Embedded systems are special purpose computer systems whose functions are implemented, controlled and managed by dedicated software. Due to the computational power, speed, and flexibility provided by software implementation of the system... more
    Embedded systems are special purpose computer systems whose functions are implemented, controlled and managed by dedicated software. Due to the computational power, speed, and flexibility provided by software implementation of the system functions, ...
    6. ACKNOWLEDGEMENTS This work was funded in part, by grants from the National Science Foundation (CNS-0619069) and Acxiom Corpora-tion (# 281539) 7. REFERENCES [I] W3C Recommendation, 2004, OWL Web Ontology Language Reference, at... more
    6. ACKNOWLEDGEMENTS This work was funded in part, by grants from the National Science Foundation (CNS-0619069) and Acxiom Corpora-tion (# 281539) 7. REFERENCES [I] W3C Recommendation, 2004, OWL Web Ontology Language Reference, at http://www.w3.org/ ...
    R. Seker, AJ van der Merwe, P. Kotze, MM Tanik, R. Paul, Assessment Of Coupling And Cohesion For Component-Based Software By Using Shannon Languages, Journal of Integrated Design & Process Science, v. 8 n. 4, p. 33-43,... more
    R. Seker, AJ van der Merwe, P. Kotze, MM Tanik, R. Paul, Assessment Of Coupling And Cohesion For Component-Based Software By Using Shannon Languages, Journal of Integrated Design & Process Science, v. 8 n. 4, p. 33-43, December 2004
    Abstract—Ubiquitous connectivity and availability of P2P re-sources creates opportunities for building new services. This paper describes Jigsaw Distributed File System (JigDFS) which can be used to securely store and retrieve files on a... more
    Abstract—Ubiquitous connectivity and availability of P2P re-sources creates opportunities for building new services. This paper describes Jigsaw Distributed File System (JigDFS) which can be used to securely store and retrieve files on a P2P network anonymously. JigDFS is ...
    Page 1. 2004 Society for Design and Process Science Printed in the United States of America ASSESSMENT OF COUPLING AND COHESION FOR COMPONENT-BASED SOFTWARE BY USING SHANNON LANGUAGES R ...