Learn More
The node capture attack in wireless sensor networks (WSNs) can be decomposed into three stages: physically capture of node, redeployment of compromised node, and rejoin the network for various insider attacks. A well accepted belief — that the physical capture is easy to implement and that its detection is difficult — has directed majority of(More)
In this paper, we conduct an experimental study over two groups of students comprising of undergraduate students (seniors) who develop software using the conventional way of performing unit testing after development and also by extracting test cases before implementation as in Agile Programming. Both groups developed the same software using an incremental(More)
We consider the improvement in accuracy of latent semantic analysis when a part of speech tagger is used to augment a term/document matrix. We first construct an augmented term/document matrix as input into singular value decomposition (SVD). The singular values then serve as principal components for a cosine projection. The results show that the addition(More)
In this paper, we demonstrate the use of a simplistic time based routing protocol called Simple Resilient Multi-hop Routing (SRMR) for a multi sink wireless sensor network (WSN). SRMR will allow the network to maximize efficiency by using a combination of performance metrics. For this simulation we will use the approximate distance measure based upon travel(More)
In this paper, we describe a game called "Shield Up!" which is a fast paced 2--4 player space shooter. The game features 3-D graphics and sound capabilities, while maintaining simple but addictive 2-dimensional play. It requires fast reflexes and accurate timing in order to succeed in a rapid death-match. It is a complex software project, designed with(More)
The prediction of accurate effort estimates from software project data sets still remains to be a challenging problem. Major amounts of data are frequently found missing in these data sets that are utilized to build effort/cost/time prediction models. Current techniques used in the industry ignore all the missing data and provide estimates based on the(More)