Giang Nguyen

Learn More
Researchers have proposed many wireless MAC protocols such as [20], [8], [25], [24], [6], and [17] which exploit frequency-agile radios and multiple available channels to increase network through-put. These protocols usually only require each node to have one radio. By carefully coordinating the frequency hopping of different nodes, different node pairs can(More)
Sensor network applications tend to exhibit significant high-level commonalities along several major dimensions that have heretofore been underexposed, particularly in the areas of collection and dissemination. We have developed a component library, sdlib, which presents the fundamental abstractions of collection and dissemination as part of a dataflow(More)
This paper presents VISTA, a new methodology and tool dedicated to analyse system level performance by executing full-scale SW application code on a transaction-level model of the SoC platform. The SoC provider provides a cycle-accurate functional model of the SoC architecture using the basic SystemC Transaction Level Modeling (TLM) components provided by(More)
Erasable itemset mining first introduced in 2009 is an interesting variation of pattern mining. The managers can use the erasable itemsets for planning production plan of the factory. Besides the problem of mining erasable itemsets, the problem of mining top-rank-k erasable itemsets is an interesting and practical problem. In this paper, we first propose a(More)
Pattern mining, one of the most important problems in data mining, involves finding existing patterns in data. This article provides a survey of the available literature on a variant of pattern mining, namely erasable itemset (EI) mining. EI mining was first presented in 2009 and META is the first algorithm to solve this problem. Since then, a number of(More)
Botnets play major roles in a vast number of threats to network security, such as DDoS attacks, generation of spam emails, information theft. Detecting Botnets is a difficult task in due to the complexity and performance issues when analyzing the huge amount of data from real large-scale networks. In major Botnet malware, the use of Domain Generation(More)
We describe Monte Carlo algorithms to solve elliptic partial differential equations with piecewise constant diffusion coefficients and general boundary conditions including Robin and transmission conditions as well as a damping term. The treatment of the boundary conditions is done via stochastic finite differences techniques which possess an higher order(More)
  • 1