B. Non-refereed Contributions:
2. Theses
- 2010
Boone, Paul,
Improving Access in Next-generation Broadband Wireless Networks,
Ph.D. Thesis, School of Computer Science, Carleton University, 2010.
- 2009
Akujobi, Frank ,
Integrated Detection of Active Worms using Multi-Sensor Data Fusion Collaborative Network Defence,
Ph.D. Thesis, Carleton University, 2010.
El Sayr, Eldai,
Learning Based Hyperbolic Position Bounding in Wireless Networks,
Master of Science, School of Computer Science, Carleton University,
2009.
Laurendeau, Christine,
Location Tracking Mitigation for Honest Nodes
and Location Estimation of Uncooperative Devices in
Wireless Mobile Networks,
Ph.D. Thesis, School of Computer Science, Carleton University, 2009.
Li, Ke,
Localization with Liars in Wireless Sensor Networks,
Master of Science Project, School of Computer Science, Carleton University,
2009.
- 2008
Jingzhe Du,
Gemetric Routing Protocol in Disruption Tolerant Network,
Master of Computer Science, School of Computer Science, University of Ottawa, August 2008.
Y. Gao,
Large Deviations for Re-sequencing Buffer Size,
M.Sc. Thesis, Carleton University, 2008.
Enrique Gutierez,
Location Estimation in Wireless Ad-Hoc Sensor Networks,
Master Thesis, Systems and Computer Engineering, Carleton University,
2008.
Jun Li,
Stochastic Modeling and Analysis of Multichannel SW-ARQ,
Ph.D. Thesis, Carleton University, 2008.
Arash Shokrani,
Bandwidth Allocation and Fairness in Resilent Packet Rings,
Ph.D. Thesis, Systems and Computer Engineering, Carleton University,
2008.
Hui Sun,
Localized Square Test Graph with Applications to Wireless Ad Hoc Networks,
Master of Computer Science, School of Computer Science, Carleton University,
April 2008.
David Whyte,
Network Scanning Detection Strategies for Enterprise Networks,
Ph.D. Thesis, School of Computer Science, Carleton University, 2008.
Andreas Wiese,
Local Approximation Algorithms for Unit Disk Graphs,
Technical Unuversity of Berlin, January 2008.
Reza Yazdani,
Bandwidth Allocation and Fairness in Resilent Packet Rings,
Ph.D. Thesis, Carleton University, February 2008.
Ahmed Zainaldin,
Low Bit-Rate Video Transmission over Wireless Zigbee Network,
Master Thesis, Systems and Computer Engineering, Carleton University,
2008.
- 2007
K. Oliver,
Complex Boundary Value Techniques Applied to Two Queue Networks with Coupled Processing,
M.Sc. Thesis, School of Mathematics and Statistics, Carleton University, September 2007.
Simon Wilkinson,
Securing Communications in an Anonymous Overlay Network,
Master of Computer Science, School of Computer Science, Carleton University,
May 2007,
- 2006
Arash Shokrani,
Hardware Architectures of High Performance Transducers for Content Inspection Engines,
Ph.D. Thesis, Carleton University, December 2006.
L. Zhan,
Fairness of Resource Allocation in Wireless Systems,
M.Sc. Thesis, School of Mathematics and Statistics, Carleton University, January 2006.
J. Hall,
Detection of Rogue Devices in Wireless Networks,
Ph.D. Thesis, School of Computer Science, Carleton University, September 2006.
Yuebiso Feng ,
Design of Packet Scheduling for High Speed Downlink Packet Access Systems,
M.Sc. Thesis, School of Mathematics and Statistics, Carleton University, August 2006.
- 2005
A. Adedigba,
Statistical Distributions for Service Times
, M. Sc., University of Saskatchewan, September 2005.
F. Larochelle,
Application of Large Deviation Principle to Queueing Systems with many sources,
Masters' Major Essay, Carleton University, February, 2005.
S. Li,
Analyzing Stochastic Call Demand with Time Varying Parameters,
M. Sc., University of Saskatchewan, October 2005.
R. McKinnon,
Large Buffer Asymptotics,
Masters' Major Essay, Carleton University, February, 2005.
K. Mosharaf, Resource management and service differentiation in WDM
networks, Ph.D. Thesis, Department of Systems and Computer Engineering,
Carleton University, 2005.
V. Paliwal, Performance Analysis of Wireless Data Networks with Rate and
Delay Variations, Masters, Department of Systems and Computer Engineering,
Carleton University, 2005.
T. Wan, Securing Routing Protocols Through Information Corroboration,
Ph.D. Thesis, Carleton University, December 2005.
K. Wang, Context-based Coalition Access Control for Ubiquitous Computing,
Master of Computer Science, University of Ottawa, December 2005
Z. Xu,
Efficient Table Lookup Algorithms for the Next Generation IP Networks, Ph.D. Thesis,
School of Mathematics and Statistics, Carleton University, January 2005.
J. Zhu,
Scheduling Algorithms for Resilient Packet Ring Networks with Video
Transport Applications,
Masters, Department of Systems and Computer Engineering, Carleton University, 2005.
S. Zou,
Intrusion Detection System for Wireless Networks Based on User Mobility Profiling
Master of Computer Science, School of Computer Science, Carleton University, December 2005.
- 2003
P. Boone,
Improving Routing Efficiency in Location-Aware Wireless Ad-hoc Networks, Master's Thesis, School of Computer Science, Carleton University, November 2003.
Z. Li, Performance
of Generative Programming Based Protocol Implementation, M. Sc.
Thesis, School of Computer Science, Carleton University, May 2003.
H. Luo, Performance Evaluation
of Service Discovery Strategies in Ad Hoc Networks, Master of Science
Information and System Science, School of Computer Science, Carleton University,
November 2003.
X. Nie, Fast IP Address Lookup Using Index Table,
Master’s Thesis, School of
Mathematics and Statistics, Carleton University, 2003.
X. Sun, IP Address Lookup and Packet
Classification Algorithms, Ph.D.
Thesis, School of Mathematics and Statistics, Carleton University, November 2003.
H. Tang, Performance Analysis and Dimensioning of Satellite Systems carrying LRD traffic, Ph.D. Thesis, Department of Systems and Computer Engineering, Carleton University, 2003.
- 2002
X.
Jiang, Performance Analysis with Network Calculus Approach,
M.Sc. Thesis, Dept of Electrical & Computer Engineering, University
of Toronto, 2002.
M. Vargas Martin, Enhancing
Hyperlink Structure for Improving Web Performance,
PH.D. Thesis, School of Computer Science, Carleton University,
December 2002.
3. Technical and internal reports
- 2010
Joaquin Garcia-Alfaro, Michel Barbeau, and Evangelos Kranakis,
A Proactive Threshold Secret Sharing Scheme Handling Gen2 Privacy Threats,
Technical Report TR-10-03,
School of Computer Science, Carleton University, March 2010.
(PDF)
Joaquin Garcia-Alfaro, Michel Barbeau, and Evangelos Kranakis,
Positioning ofWireless Sensor Nodes in the Presence of Liars,
Technical Report TR-10-04,
School of Computer Science, Carleton University, March 2010.
(PDF)
- 2009
Christine Laurendeau and Michel Barbeau,
Wireless Network-based Relative Span Weighted Localization of Uncooperative Nodes,
Technical Report TR-09-04, School of Computer Science, Carleton University,
March 2009.
Christine Laurendeau and Michel Barbeau,
Localization and Tracking of Mobile Attackers Using Hyperbolic Position Bounding in Vehicular Networks,
Technical Report TR-09-01, School of Computer Science, Carleton University,
January 2009.
- 2008
Christine Laurendeau and Michel Barbeau,
Malicious Node Position Bounding in Mobile WiFi/802.11 Networks,
Technical Report
TR-08-09,
School of Computer Science, Carleton University.
(PDF)
Christine Laurendeau and Michel Barbeau,
Compounding Probabilistic Evidence for Hyperbolic Rogue Location Estimation,
Technical Report
TR-08-04,
School of Computer Science, Carleton University.
(PDF)
Christine Laurendeau and Michel Barbeau,
Rogue Attribution Using Relative Signal Strength Based Location Estimation,
Technical Report
TR-08-01,
School of Computer Science, Carleton University.
(PDF)
- 2007
Mathieu Couture, Michel Barbeau, Prosenjit Bose, Paz Carmi and
Evengelos Kranakis,
Location Oblivious Distributed Unit Disk Graph Coloring,
Technical Report
TR-07-01,
School of Computer Science, Carleton University.
- 2006
Mathieu Couture, Michel Barbeau, Prosenjit Bose, Evangelos Kranakis,
Incremental Construction of k-Dominating Sets in Wireless Sensor Networks
Technical Report TR-06-11, School of Computer Science, Carleton University, 2006, 24 pages.
- 2005
Jeyanthi Hall, Michel Barbeau, Evangelos Kranakis,
Anomaly-based Intrusion Detection Using Mobility Profiles of Public Transportation Users,
Technical Report TR-05-01, School of Computer Science, Carleton University, 2005, 9 pages.
A. Bose and Gang Li,
Some Stochastic Properties of Leaky Bucket.
Report series of the LRSP, Carleton University-Ottawa University.
A. Bose,
NetCal analysis of a system with communicating blocking and competing of resources. Internal report.
A. Bose,
Performance analysis of multithreaded processor with NetCal. Internal report.
- 2004
A. Bose, Xiaoyue Jiang, Bin Liu
and Gang Li, Analysis of
Manufacturing Blocking Systems with Network Calculus.
A. Bose, J. Li, D. Montuno, J. Wang, Q. Wang and Y.Q. Zhao,
In-Sequence
SDU Delivery Delay in RLC Layer of a UMTS, January 2004.
A. Bose, G. Li, F. Larochelle, Aggregated flows: A NetCal view, Report series of
the LRSP, Carleton University-Ottawa University.
A. Bose, G. Li, F.
Larochelle, A NetCal study of parallel system with Manufacture Blocking, Report
series of the LRSP, Carleton University-Ottawa University.
A. Bose,
G. Li, X. Jiang, Max-plus Equivalence of Network Calculus, Report series of the
LRSP, Carleton University-Ottawa University.
A. Bose, G. Li, Output
Process of Leaky Bucket, Report series of the LRSP, Carleton University-Ottawa
University.
A. Bose, TeleMath and Queueing Theory, Mittag-Leffler
Institute, Sweden during October, 2004.
M. Barbeau, P. Boone, J. Hall, E. Kranakis and S. Zou, Anomaly-based
Intrusion Detection Using Mobility Profiles of Wireless/Mobile Users –
Phase I, April 2004, 43 pages.
M. Barbeau, P. Boone, J. Hall, E. Kranakis and S. Zou, Anomaly-based
Intrusion Detection Using Mobility Profiles of Wireless/Mobile Users –
Phase II, August 2004, 47 pages.
J. Li, D. Montuno, J. Wang and Y.Q. Zhao, Performance Evaluation of
the
Radio Link Control Protocol in 3G UMTS, January 2004.
R. Liscano and K. Wang, Coalition Access Control for Facilitating Ad
Hoc
Interactions – Phase I, April 2004, 25 pages.
R. Liscano and K. Wang, Coalition Access Control for Facilitating Ad
Hoc
Interactions - Phase II, July 2004, 15 pages.
K. Navaie, Cross-Layer Optimization for QoS Constrained Data Services
in
Next Generation Cellular CDMA Networks, January 2004.
T. Wan, E. Kranakis and P.C. van Oorschot, Pretty Secure BGP (psBGP),
Technical Report (TR-04-07), School of Computer Science, Carleton
University, September 02, 2004.
- 2003
X. Sun,
Report on packet classification experimental study,
Technical Report Series No.001-2003 for projects sponsored by ALCATEL/MITACS/NICT,
2003.
Z. Xu,
Study of IP address lookup and packet classification,
(Internal report), 2003.
Z. Xu, G. Damm, I. Lambadaris, Y.Q. Zhao,
A Novel IP Address Lookup Approach, (Internal report), 2003.
- 2002
Z. Siddique,
Fast IP-address Lookup Algorithms,
Technical Report Series No.001-2002 for projects sponsored by ALCATEL/MITACS/NICT,
2002.
X. Sun, IP Address Lookups and Packet Classification ---
A tutorial and Review, Technical Report Series
No.002-2002 for projects sponsored by ALCATEL/MITACS/NICT,
2002.
X. Sun, Y.Q. Zhao,
Packet Classification Using Independent Sets,
Technical Report Series No.003-2002 for projects sponsored by ALCATEL/MITACS/NICT,
2002.
Z. Xu, IP Lookup by Using Weights,
Technical Report Series No.002-2003 for projects sponsored by ALCATEL/MITACS/NICT,
2002.
- 1999
D. A. Dawson, Q. Jiang, D. Slonowsky and R. Srinivasan,
Measurement Based Adaptive Traffic Prediction using Fuzzy Logic (32 pages),
a progress report submitted to Nortel Networks, July 1999.
5. Other
- Feature Articles
- 2009
Joaquin Garcia-Alfaro, Michel Barbeau and Evangelos Kranakis,
Les composants RFID sont-ils vulnérables?
Techniques de l'ingénieur, Juillet 2009, pp. 40-44 (premiere partie); Septembre 2009 (deuxieme partie).
- 2007
M. Barbeau and C. Laurendeau,
Tilting at Giants: Avoiding Quixotic Pursuits in Understanding the Threats to Wireless Network Security,
MITACS e-newsletter, Connections, September 2007.
- 2006
Marc Olanié,
Capture d'empreinte « digitale » de pirate sans fil., Réseaux-Télécoms, Sept, 2006 (Discusses Jeyanthi Hall's Research)
Jack Shandle,
University Research Aims At More Secure Wi-Fi, InformationWeek, Sept, 2006 (Discusses Jeyanthi Hall's Research)
WiFi fingerprints could end MAC spoofing, Techworld, Sept 5, 2006 (Discusses Jeyanthi Hall's Research)
- 2005
Carleton University Develops New Technology to Help Prevent Unauthorized WiFi Network Access with MATLAB and the Anritsu Signature, MathWorks: User Stories, April 2005.
Sophisticated receivers aren't child's play, (Features John Lambadaris and Sombra Labs Inc.), The Ottawa Citizen, Thursday, October 20, 2005
Carleton University Student Kayvan Mosharaf Wins MITACS Technology Transfer Student Award, October 2005
- Posters
- 2006
Mathieu Couture, Incremental k-Domination in Unit Disk Graphs,
MITACS 7th Annual Conference,MITACS NCE, York University, Toronto, June 2006.
Michel Paquette, Fault Dependence and Network Communications,
MITACS 7th Annual Conference,MITACS NCE, York University, Toronto, June 2006.(First Prize)
Song Li, Analyzing Stochastic Call Demand With Time Varying Parameters,
MITACS 7th Annual Conference,MITACS NCE, York University, Toronto, June 2006.
- 2005
A. Adedigba, Statistical Distributions for Service Times,
MITACS 6th Annual Conference, Calgary, Alberta, May 2005.
P. Boone, WiMAX: The Future of Broadband Wireless Networks,
MITACS 6th Annual Conference, Calgary, Alberta, May 2005.
S. Zou, Anomaly-based IDS with User Mobility Profiles,
MITACS 6th Annual Conference, Calgary, Alberta, May 2005.
- 2004
P. Boone, Improving Routing Efficiency in Ad-Hoc Networks,
MITACS 5th Annual Conference, Halifax, Nova Scotia, June 2004.
J. Hall, and S. Zou, Using Multi-Sensor Data for Anamoly-Based Intrusion Detection, MITACS 5th Annual Conference, Halifax, Nova Scotia, June 2004.
(Second Level Prize)
S. Li, Z. Zhang, Y. Yin, and A. Adedigba, Statistical Analysis of U-Content Data,
MITACS 5th Annual Conference, Halifax, Nova Scotia, June 2004.
K. Wang, Coalition Access Control for Facilitating Ad Hoc
Collaboration,
MITACS 5th Annual Conference, Halifax, Nova Scotia, June 2004.
- 2003
A. Adegboyiega, Mitigating Unfairness in Diffserv Assured Forwarding,
MITACS Fourth Annual Conference May 8-10, 2003. (First Level
Prize)
F. Akujobi, Congestion Control in TCP/IP Networks: A Combined ECN and BECN Approach, MITACS Fourth Annual Conference May 8-10, 2003.
J. Hall, Detection of Transient in Radio Frequency Fingerprinting
Using Signal Phase, MITACS Fourth
Annual Conference May 8-10, 2003.
Z. Li, Performance of Generative Programming Based Protocol
Implementation, MITACS Fourth Annual Conference
May 8-10, 2003.
A. Matrawy, An Architecture for Real-time Multicast Video in
Assured Forwarding Networks,
MITACS Fourth Annual Conference May 8-10, 2003.
X. Nie, Fast IP Address Lookup Using Index Table,
MITACS Fourth Annual Conference May 8-10, 2003.
X. Sun, Packet Classification Algorithm
Using Independent Sets , MITACSFourth Annual Conference May
8 - 10, 2003.
J. Talim, Fuzzy Connection Admission Control for Self-managed
Networks, MITACS Fourth Annual Conference
May 8-10, 2003.
H. Tang, Resource Allocation in Ring networks with Spatial Reuse,
MITACS Fourth Annual Conference May 8-10, 2003. (Third
Level Prize)
Y. Tang, Bounds for Frequency Estimation on Packet Stream,
MITACS Fourth Annual Conference May 8-10, 2003.
J. Wang, Staffing a Call Center with Impatient Customers,
MITACS Fourth Annual Conference May 8-10, 2003.
Z. Xu, Packet Forwarding With the Help of Comb Extraction Scheme,
MITACS Fourth Annual Conference May 8-10, 2003.
- Lectures
- 2004
J. Li, Performance Evaluation of the Radio Link Control Protocol in 3G
UMTS, Nortel Networks, Ottawa, March, 2004.
K. Navaie, Cross-Layer Optimization for Next Generation Cellular CDMA
Networks, Nortel Networks, Ottawa, March, 2004.
K. Navaie, Cross-Layer Optimization for QoS Constrained Data Services
in
Next Generation Cellular CDMA Networks, Nortel Networks, Ottawa, March
2004.
Q. Wang, In-Sequence SDU Delivery Delay in RLC Layer of a UMTS, Nortel
Networks, Ottawa, March 2004.
|