Learn More
Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the proliferation of anonymous communication systems on the Internet has posed significant challenges to providing such traceback capability. In this paper, we develop a new class of flow(More)
—Small talk is an important social lubricant that helps people, especially strangers, initiate conversations and make friends with each other in physical proximity. However, due to difficulties in quickly identifying significant topics of common interest, real-world small talk tends to be superficial. The mass popularity of mobile phones can help improve(More)
It is well-known that placing disks in the triangular lattice pattern is optimal for achieving full coverage on a plane. With the emergence of wireless sensor networks, however, it is now no longer enough to consider coverage alone when deploying a wireless sensor network; connectivity must also be con-sidered. While moderate loss in coverage can be(More)
—Falls are a major health risk that diminish the quality of life among elderly people. With the elderly population surging, especially with aging " baby boomers " , fall detection becomes increasingly important. However, existing commercial products and academic solutions struggle to achieve pervasive fall detection. In this paper, we propose utilizing(More)
—This paper presents the general approach, design, implementation , and evaluation of NetCamo, which is a system to prevent traffic analysis in systems with real-time requirements. Integrated support for both security and real-time is becoming necessary for computer networks that support mission critical applications. This study focuses on how to integrate(More)
Falls are a major health risk that diminishes the quality of life among the elderly people. The importance of fall detection increases as the elderly population surges, especially with aging ''baby boomers''. However, existing commercial products and academic solutions all fall short of pervasive fall detection. In this paper, we propose utilizing mobile(More)
In this paper, we study the issue of sensor networks deployment using limited mobility sensors. By limited mobility, we mean that the maximum distance that sensors are capable of moving to is limited. Given an initial deployment of limited mobility sensors in a field clustered into multiple regions, our deployment problem is to determine a movement plan for(More)
In this paper, we present a survey on management mechanisms used for ensuring the Quality-of-Services for Voice-over-IP applications. We first address the motivations of QoS management for VoIP. We then partition the system into two management planes: data plane and control plane, and describe mechanisms in each plane respectively. In data plane, we cover(More)
— Recently, the direct sequence spread-spectrum (DSSS)-based technique has been proposed to trace anonymous network flows. In this technique, homogeneous pseudo-noise (PN) codes are used to modulate multiple-bit signals that are embedded into the target flow as watermarks. This technique could be maliciously used to degrade an anonymous communication(More)
—In wireless sensor networks, multiple-coverage, in which each point is covered by more than one sensor, is often required to improve detection quality and achieve high fault tolerance. However, finding optimal patterns that achieve multiple-coverage in a plane remains a long-lasting open problem. In this paper, we first derive the optimal deployment(More)