Data Set Used
The node capture attack in wireless sensor networks (WSNs) can be decomposed into three stages: physically capture of node, redeployment of compromised node, and rejoin the network for various insider attacks. A well accepted belief — that the physical capture is easy to implement and that its detection is difficult — has directed majority of… (More)
In this paper, we conduct an experimental study over two groups of students comprising of undergraduate students (seniors) who develop software using the conventional way of performing unit testing after development and also by extracting test cases before implementation as in Agile Programming. Both groups developed the same software using an incremental… (More)
We consider the improvement in accuracy of latent semantic analysis when a part of speech tagger is used to augment a term/document matrix. We first construct an augmented term/document matrix as input into singular value decomposition (SVD). The singular values then serve as principal components for a cosine projection. The results show that the addition… (More)
17 In this study, we compare the performance of four different imputation strategies ranging from the commonly used Listwise Deletion to model based approaches such as the Max-19 imum Likelihood on enhancing completeness in incomplete software project data sets. We evaluate the impact of each of these methods by implementing them on six different 21… (More)
In this paper, we demonstrate the use of a simplistic time based routing protocol called Simple Resilient Multi-hop Routing (SRMR) for a multi sink wireless sensor network (WSN). SRMR will allow the network to maximize efficiency by using a combination of performance metrics. For this simulation we will use the approximate distance measure based upon travel… (More)
We argue in this paper that aspect-oriented-programming (AOP) maintains a programmer independent coordinate system and hence supports program correctness proofs. To show this, we revisit Dijkstra's and Knuth's original arguments on structured programming.
Intrusion Detection System (IDS) is an application software which detects the presence of hostile or intrusive elements inside the system. As the nature and type of the intrusions are continuously changing, a simple IDS cannot completely tackle the security threat. In this paper, we have proposed an IDS model, which classifies different types of intrusion… (More)