Learn More
Technological progress in the fields of Micro Electro-Mechanical Systems (MEMS) and wireless communications and also the availability of CMOS cameras, microphones and small-scale array sensors, which may ubiquitously capture multimedia content from the field, have fostered the development of low-cost limited resources Wireless Video-based Sensor Networks(More)
—As the complexity of the integrated circuits increases, they become more susceptible to manufacturing faults, decreasing the total process yield. Thus, it would be desirable to develop techniques for reusing faulty dies, even with a degraded performance. In this paper, a new method for high level synthesis of degradable ASICs is presented. Our technique(More)
Since now, some scheduling algorithms have been presented to guarantee the time constraints of soft real-time tasks, but most of them have some drawbacks. The first drawback of them is that scheduling decisions are based on parameters which are assumed to be crisp; however, in many environments the values of these parameters are uncertain. The second one is(More)
One of the primary challenges in IDS alerts analysis is controlling and archiving the huge amount of alerts that have been triggered mainly in attack periods. We have developed a self-adaptive controlling mechanism which archives the Snort generated alerts in a well-formed abstracted format. An appropriate hashing technique along with a full-automated(More)
Since software is playing an increasingly important role in system-on-chip, retargetable compilation has been an active research area in the last few years. However, the retargetting of equally important downstream system tools, such as assemblers, linkers and debuggers, has either been ignored, or falls short of meeting the requirements of modern(More)
In many distributed systems, we need a leader for coordinating other's members. In this structure, when the leader is crashed, other nodes must elect another leader. Many algorithms for leader election have proposed. In this paper, we introduce a new algorithm for leader election that reduces number of messages rather than other algorithms.
Botnets (networks of compromised computers) are often used for malicious activities such as spam, click fraud, identity theft, phishing, and distributed denial of service (DDoS) attacks. Most of previous researches have introduced fully or partially signature-based botnet detection approaches. In this paper, we propose a fully anomaly-based approach that(More)
Routing in MANETs becomes a more sophisticated issue especially when a certain QoS requirement is to be satisfied. One of the most important QoS metrics is end-to-end reliability. Multi-path routing can be considered as an effective method to support end-to-end reliability. However, the path discovery in current multi-path routing algorithms considering(More)