Learn More
— In this paper, we focus on the problem of designing an energy efficient MAC protocol for wireless sensor networks and propose a novel scheme, named as TEEM (Traffic aware, Energy Efficient MAC). Inspired by S-MAC protocol, probably the most well-known sensor MAC scheme for energy efficiency, the proposed TEEM is also based on the concept of 'listen/sleep(More)
—Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, and inserts arbitrary number of replicas into the network. Consequently , the adversary can carry out many internal attacks. Previous solutions on detecting clone attacks have several(More)
—This note considers the problem of evaluating a probabilistic distance between discrete-time, homogeneous, first-order, finite-state finite-alphabet hidden Markov models (HMMs). Our approach is based on a correspondence between probability measures and HMMs established in this note. Using a probability measure transformation technique, we obtain re-cursive(More)
We propose a simple distance-vector protocol for routing in networks having unidirectional links. The protocol can be seen as an adaptation for these networks of the strategy as used in the popular RIP protocol. The protocol comprises two main algorithms, one for collecting \from" information, and the other one for generating and propagating \to"(More)
Return-Oriented Programming (ROP) is a technique which leverages the instruction gadgets in existing libraries/executables to construct Turing complete programs. However, ROP attack is usually composed with gadgets which are ending in ret instruction without the corresponding call instruction. Based on this fact, several defense mechanisms have been(More)
There is a long-standing debate about whether statins have chemopreventive properties against colorectal cancer (CRC), but the results remain inconclusive. We therefore present a meta-analysis to investigate the association between statin use and risk of CRC. A comprehensive literature search was undertaken through July 2013 looking for eligible studies.(More)
Since smartphones have stored diverse sensitive privacy information, including credit card and so on, a great deal of malware are desired to tamper them. As one of the most prevalent platforms, Android contains sensitive resources that can only be accessed via corresponding APIs, and the APIs can be invoked only when user has authorized permissions in the(More)