Whay C. Lee

Learn More
This paper provides a tutorial for topology arregation in large hierarchical communication networks. Specifically, it examines some issues of topology aggregation for hierarchical PNNI Routing in ATM networks, presents a complex node representation, and provides some guidelines for topology aggregation. There are two main reasons for topology aggregation.(More)
1 Mobility patterns of first responders (FRs) have distinct properties from other well-studied networks, such as vehicular and campus networks. FRs are mission-oriented. They are organized, cooperative and responsive to emergency situations. In this paper, we propose a novel mobility model, CORPS, which captures both environmental and operational(More)
This report considers combining information to improve retrieval. The vector space model has been extended so different classes of data are associated with distinct concept types and their respective subvectors. Two collections with multiple concept types are described, ISI-1460 and CACM-3204. Experiments indicate that regression methods can help predict(More)
—In mission-critical networks, command, alerts, and critical data are frequently broadcast over wireless networks. Broadcast traffic must be protected from malicious attacks, wherein sources are impersonated or broadcast packets are forged. Even though broadcast authentication eliminates such attacks, attackers can still launch Denial-of-Service attacks by(More)
— Reliable message propagation is an important means of communication in mobile ad hoc networks (MANETs), and serves as a fundamental component for various applications , such as mobile advertising, inter-vehicle safety message propagation, alert propagation to defend against cyber-attacks in MANETs. Reliable message propagation requires that a message can(More)
— Intrusion/misbehavior detection and response are two important components for defending against various attacks in mobile ad hoc networks. Unfortunately, there is a gap between local intrusion/misbehavior detection and network-wide response in such networks. To bridge this gap, alert propagation, aiming to spread alert messages to the whole network upon(More)
  • 1