Mathematics of Information Technology and Complex Systems Complex Adaptive Networks for Computing and Communication (CANCCOM)





Homepage



Project Highlights



Research

 
Team Members

 
Partner Organizations



Students

 
Publications

 
Presentations

 
Events

 
MITACS Home

 


Publications

B. Non-refereed Contributions:


2. Theses

- 2010

Boone, Paul, Improving Access in Next-generation Broadband Wireless Networks, Ph.D. Thesis, School of Computer Science, Carleton University, 2010.


- 2009

Akujobi, Frank , Integrated Detection of Active Worms using Multi-Sensor Data Fusion Collaborative Network Defence, Ph.D. Thesis, Carleton University, 2010.

El Sayr, Eldai, Learning Based Hyperbolic Position Bounding in Wireless Networks, Master of Science, School of Computer Science, Carleton University, 2009.

Laurendeau, Christine, Location Tracking Mitigation for Honest Nodes and Location Estimation of Uncooperative Devices in Wireless Mobile Networks, Ph.D. Thesis, School of Computer Science, Carleton University, 2009.

Li, Ke, Localization with Liars in Wireless Sensor Networks, Master of Science Project, School of Computer Science, Carleton University, 2009.


- 2008

Jingzhe Du, Gemetric Routing Protocol in Disruption Tolerant Network, Master of Computer Science, School of Computer Science, University of Ottawa, August 2008.

Y. Gao, Large Deviations for Re-sequencing Buffer Size, M.Sc. Thesis, Carleton University, 2008.

Enrique Gutierez, Location Estimation in Wireless Ad-Hoc Sensor Networks, Master Thesis, Systems and Computer Engineering, Carleton University, 2008.

Jun Li, Stochastic Modeling and Analysis of Multichannel SW-ARQ, Ph.D. Thesis, Carleton University, 2008.

Arash Shokrani, Bandwidth Allocation and Fairness in Resilent Packet Rings, Ph.D. Thesis, Systems and Computer Engineering, Carleton University, 2008.

Hui Sun, Localized Square Test Graph with Applications to Wireless Ad Hoc Networks, Master of Computer Science, School of Computer Science, Carleton University, April 2008.

David Whyte, Network Scanning Detection Strategies for Enterprise Networks, Ph.D. Thesis, School of Computer Science, Carleton University, 2008.

Andreas Wiese, Local Approximation Algorithms for Unit Disk Graphs, Technical Unuversity of Berlin, January 2008.

Reza Yazdani, Bandwidth Allocation and Fairness in Resilent Packet Rings, Ph.D. Thesis, Carleton University, February 2008.

Ahmed Zainaldin, Low Bit-Rate Video Transmission over Wireless Zigbee Network, Master Thesis, Systems and Computer Engineering, Carleton University, 2008.

- 2007

K. Oliver, Complex Boundary Value Techniques Applied to Two Queue Networks with Coupled Processing, M.Sc. Thesis, School of Mathematics and Statistics, Carleton University, September 2007.

Simon Wilkinson, Securing Communications in an Anonymous Overlay Network, Master of Computer Science, School of Computer Science, Carleton University, May 2007,

- 2006

Arash Shokrani, Hardware Architectures of High Performance Transducers for Content Inspection Engines, Ph.D. Thesis, Carleton University, December 2006.

L. Zhan, Fairness of Resource Allocation in Wireless Systems, M.Sc. Thesis, School of Mathematics and Statistics, Carleton University, January 2006.

J. Hall, Detection of Rogue Devices in Wireless Networks, Ph.D. Thesis, School of Computer Science, Carleton University, September 2006.

Yuebiso Feng , Design of Packet Scheduling for High Speed Downlink Packet Access Systems, M.Sc. Thesis, School of Mathematics and Statistics, Carleton University, August 2006.

- 2005

A. Adedigba, Statistical Distributions for Service Times , M. Sc., University of Saskatchewan, September 2005.

F. Larochelle, Application of Large Deviation Principle to Queueing Systems with many sources, Masters' Major Essay, Carleton University, February, 2005.

S. Li, Analyzing Stochastic Call Demand with Time Varying Parameters, M. Sc., University of Saskatchewan, October 2005.

R. McKinnon, Large Buffer Asymptotics, Masters' Major Essay, Carleton University, February, 2005.

K. Mosharaf, Resource management and service differentiation in WDM networks, Ph.D. Thesis, Department of Systems and Computer Engineering, Carleton University, 2005.

V. Paliwal, Performance Analysis of Wireless Data Networks with Rate and Delay Variations, Masters, Department of Systems and Computer Engineering, Carleton University, 2005.

T. Wan, Securing Routing Protocols Through Information Corroboration, Ph.D. Thesis, Carleton University, December 2005.

K. Wang, Context-based Coalition Access Control for Ubiquitous Computing, Master of Computer Science, University of Ottawa, December 2005

Z. Xu, Efficient Table Lookup Algorithms for the Next Generation IP Networks, Ph.D. Thesis, School of Mathematics and Statistics, Carleton University, January 2005.

J. Zhu, Scheduling Algorithms for Resilient Packet Ring Networks with Video Transport Applications, Masters, Department of Systems and Computer Engineering, Carleton University, 2005.

S. Zou, Intrusion Detection System for Wireless Networks Based on User Mobility Profiling Master of Computer Science, School of Computer Science, Carleton University, December 2005.

- 2003

P. Boone, Improving Routing Efficiency in Location-Aware Wireless Ad-hoc Networks, Master's Thesis, School of Computer Science, Carleton University, November 2003.

Z. Li, Performance of Generative Programming Based Protocol Implementation, M. Sc. Thesis, School of Computer Science, Carleton University, May 2003.

H. Luo, Performance Evaluation of Service Discovery Strategies in Ad Hoc Networks, Master of Science Information and System Science, School of Computer Science, Carleton University, November 2003.

X. Nie, Fast IP Address Lookup Using Index Table, Master’s Thesis, School of Mathematics and Statistics, Carleton University, 2003.

X. Sun, IP Address Lookup and Packet Classification Algorithms, Ph.D. Thesis, School of Mathematics and Statistics, Carleton University, November 2003.

H. Tang, Performance Analysis and Dimensioning of Satellite Systems carrying LRD traffic, Ph.D. Thesis, Department of Systems and Computer Engineering, Carleton University, 2003.

- 2002

X. Jiang, Performance Analysis with Network Calculus Approach, M.Sc. Thesis, Dept of Electrical & Computer Engineering, University of Toronto, 2002.

M. Vargas Martin,  Enhancing Hyperlink Structure for Improving Web Performance, PH.D. Thesis, School of Computer Science, Carleton University, December 2002.

3. Technical and internal reports

- 2010

Joaquin Garcia-Alfaro, Michel Barbeau, and Evangelos Kranakis, A Proactive Threshold Secret Sharing Scheme Handling Gen2 Privacy Threats, Technical Report TR-10-03, School of Computer Science, Carleton University, March 2010. (PDF)

Joaquin Garcia-Alfaro, Michel Barbeau, and Evangelos Kranakis, Positioning ofWireless Sensor Nodes in the Presence of Liars, Technical Report TR-10-04, School of Computer Science, Carleton University, March 2010. (PDF)

- 2009

Christine Laurendeau and Michel Barbeau, Wireless Network-based Relative Span Weighted Localization of Uncooperative Nodes, Technical Report TR-09-04, School of Computer Science, Carleton University, March 2009.

Christine Laurendeau and Michel Barbeau, Localization and Tracking of Mobile Attackers Using Hyperbolic Position Bounding in Vehicular Networks, Technical Report TR-09-01, School of Computer Science, Carleton University, January 2009.

- 2008

Christine Laurendeau and Michel Barbeau, Malicious Node Position Bounding in Mobile WiFi/802.11 Networks, Technical Report TR-08-09, School of Computer Science, Carleton University. (PDF)

Christine Laurendeau and Michel Barbeau, Compounding Probabilistic Evidence for Hyperbolic Rogue Location Estimation, Technical Report TR-08-04, School of Computer Science, Carleton University. (PDF)

Christine Laurendeau and Michel Barbeau, Rogue Attribution Using Relative Signal Strength Based Location Estimation, Technical Report TR-08-01, School of Computer Science, Carleton University. (PDF)

- 2007

Mathieu Couture, Michel Barbeau, Prosenjit Bose, Paz Carmi and Evengelos Kranakis, Location Oblivious Distributed Unit Disk Graph Coloring, Technical Report TR-07-01, School of Computer Science, Carleton University.

- 2006

Mathieu Couture, Michel Barbeau, Prosenjit Bose, Evangelos Kranakis, Incremental Construction of k-Dominating Sets in Wireless Sensor Networks Technical Report TR-06-11, School of Computer Science, Carleton University, 2006, 24 pages.

- 2005

Jeyanthi Hall, Michel Barbeau, Evangelos Kranakis, Anomaly-based Intrusion Detection Using Mobility Profiles of Public Transportation Users, Technical Report TR-05-01, School of Computer Science, Carleton University, 2005, 9 pages.

A. Bose and Gang Li, Some Stochastic Properties of Leaky Bucket. Report series of the LRSP, Carleton University-Ottawa University.

A. Bose, NetCal analysis of a system with communicating blocking and competing of resources. Internal report.

A. Bose, Performance analysis of multithreaded processor with NetCal. Internal report.

- 2004

A. Bose, Xiaoyue Jiang, Bin Liu and Gang Li, Analysis of Manufacturing Blocking Systems with Network Calculus.

A. Bose, J. Li, D. Montuno, J. Wang, Q. Wang and Y.Q. Zhao, In-Sequence SDU Delivery Delay in RLC Layer of a UMTS, January 2004.

A. Bose, G. Li, F. Larochelle, Aggregated flows: A NetCal view, Report series of the LRSP, Carleton University-Ottawa University.

A. Bose, G. Li, F. Larochelle, A NetCal study of parallel system with Manufacture Blocking, Report series of the LRSP, Carleton University-Ottawa University.

A. Bose, G. Li, X. Jiang, Max-plus Equivalence of Network Calculus, Report series of the LRSP, Carleton University-Ottawa University.

A. Bose, G. Li, Output Process of Leaky Bucket, Report series of the LRSP, Carleton University-Ottawa University.

A. Bose, TeleMath and Queueing Theory, Mittag-Leffler Institute, Sweden during October, 2004.

M. Barbeau, P. Boone, J. Hall, E. Kranakis and S. Zou, Anomaly-based Intrusion Detection Using Mobility Profiles of Wireless/Mobile Users – Phase I, April 2004, 43 pages.

M. Barbeau, P. Boone, J. Hall, E. Kranakis and S. Zou, Anomaly-based Intrusion Detection Using Mobility Profiles of Wireless/Mobile Users – Phase II, August 2004, 47 pages.

J. Li, D. Montuno, J. Wang and Y.Q. Zhao, Performance Evaluation of the Radio Link Control Protocol in 3G UMTS, January 2004.

R. Liscano and K. Wang, Coalition Access Control for Facilitating Ad Hoc Interactions – Phase I, April 2004, 25 pages.

R. Liscano and K. Wang, Coalition Access Control for Facilitating Ad Hoc Interactions - Phase II, July 2004, 15 pages.

K. Navaie, Cross-Layer Optimization for QoS Constrained Data Services in Next Generation Cellular CDMA Networks, January 2004.

T. Wan, E. Kranakis and P.C. van Oorschot, Pretty Secure BGP (psBGP), Technical Report (TR-04-07), School of Computer Science, Carleton University, September 02, 2004.

- 2003

X. Sun, Report on packet classification experimental study, Technical Report Series No.001-2003 for projects sponsored by ALCATEL/MITACS/NICT, 2003.

Z. Xu, Study of IP address lookup and packet classification, (Internal report), 2003.

Z. Xu, G. Damm, I. Lambadaris, Y.Q. Zhao, A Novel IP Address Lookup Approach, (Internal report), 2003.

- 2002

Z. Siddique, Fast IP-address Lookup Algorithms, Technical Report Series No.001-2002 for projects sponsored by ALCATEL/MITACS/NICT, 2002.

X. Sun, IP Address Lookups and Packet Classification --- A tutorial and Review, Technical Report Series No.002-2002 for projects sponsored by ALCATEL/MITACS/NICT, 2002.

X. Sun, Y.Q. Zhao, Packet Classification Using Independent Sets, Technical Report Series No.003-2002 for projects sponsored by ALCATEL/MITACS/NICT, 2002.

Z. Xu, IP Lookup by Using Weights, Technical Report Series No.002-2003 for projects sponsored by ALCATEL/MITACS/NICT, 2002.

- 1999

D. A. Dawson, Q. Jiang, D. Slonowsky and R. Srinivasan, Measurement Based Adaptive Traffic Prediction using Fuzzy Logic (32 pages), a progress report submitted to Nortel Networks, July 1999.

5. Other

- Feature Articles

- 2009

Joaquin Garcia-Alfaro, Michel Barbeau and Evangelos Kranakis, Les composants RFID sont-ils vulnérables? Techniques de l'ingénieur, Juillet 2009, pp. 40-44 (premiere partie); Septembre 2009 (deuxieme partie).

- 2007

M. Barbeau and C. Laurendeau, Tilting at Giants: Avoiding Quixotic Pursuits in Understanding the Threats to Wireless Network Security, MITACS e-newsletter, Connections, September 2007.

- 2006

Marc Olanié, Capture d'empreinte « digitale » de pirate sans fil., Réseaux-Télécoms, Sept, 2006 (Discusses Jeyanthi Hall's Research)

Jack Shandle, University Research Aims At More Secure Wi-Fi, InformationWeek, Sept, 2006 (Discusses Jeyanthi Hall's Research)

WiFi fingerprints could end MAC spoofing, Techworld, Sept 5, 2006 (Discusses Jeyanthi Hall's Research)

- 2005

Carleton University Develops New Technology to Help Prevent Unauthorized WiFi Network Access with MATLAB and the Anritsu Signature, MathWorks: User Stories, April 2005.

Sophisticated receivers aren't child's play, (Features John Lambadaris and Sombra Labs Inc.), The Ottawa Citizen, Thursday, October 20, 2005

Carleton University Student Kayvan Mosharaf Wins MITACS Technology Transfer Student Award, October 2005

- Posters

- 2006

Mathieu Couture, Incremental k-Domination in Unit Disk Graphs, MITACS 7th Annual Conference,MITACS NCE, York University, Toronto, June 2006.

Michel Paquette, Fault Dependence and Network Communications, MITACS 7th Annual Conference,MITACS NCE, York University, Toronto, June 2006.(First Prize)

Song Li, Analyzing Stochastic Call Demand With Time Varying Parameters, MITACS 7th Annual Conference,MITACS NCE, York University, Toronto, June 2006.

- 2005

A. Adedigba, Statistical Distributions for Service Times, MITACS 6th Annual Conference, Calgary, Alberta, May 2005.

P. Boone, WiMAX: The Future of Broadband Wireless Networks, MITACS 6th Annual Conference, Calgary, Alberta, May 2005.

S. Zou, Anomaly-based IDS with User Mobility Profiles, MITACS 6th Annual Conference, Calgary, Alberta, May 2005.

- 2004

P. Boone, Improving Routing Efficiency in Ad-Hoc Networks, MITACS 5th Annual Conference, Halifax, Nova Scotia, June 2004.

J. Hall, and S. Zou, Using Multi-Sensor Data for Anamoly-Based Intrusion Detection, MITACS 5th Annual Conference, Halifax, Nova Scotia, June 2004. (Second Level Prize)

S. Li, Z. Zhang, Y. Yin, and A. Adedigba, Statistical Analysis of U-Content Data, MITACS 5th Annual Conference, Halifax, Nova Scotia, June 2004.

K. Wang, Coalition Access Control for Facilitating Ad Hoc Collaboration, MITACS 5th Annual Conference, Halifax, Nova Scotia, June 2004.

- 2003

A. Adegboyiega, Mitigating Unfairness in Diffserv Assured Forwarding, MITACS Fourth Annual Conference May 8-10, 2003. (First Level Prize)

F. Akujobi, Congestion Control in TCP/IP Networks: A Combined ECN and BECN Approach, MITACS Fourth Annual Conference May 8-10, 2003.

J. Hall, Detection of Transient in Radio Frequency Fingerprinting Using Signal Phase, MITACS Fourth Annual Conference May 8-10, 2003.

Z. Li, Performance of Generative Programming Based Protocol Implementation, MITACS Fourth Annual Conference May 8-10, 2003.

A. Matrawy, An Architecture for Real-time Multicast Video in Assured Forwarding Networks, MITACS Fourth Annual Conference May 8-10, 2003.

X. Nie, Fast IP Address Lookup Using Index Table, MITACS Fourth Annual Conference May 8-10, 2003.

X. Sun, Packet Classification Algorithm Using Independent Sets , MITACSFourth Annual Conference May 8 - 10, 2003.

J. Talim, Fuzzy Connection Admission Control for Self-managed Networks, MITACS Fourth Annual Conference May 8-10, 2003.

H. Tang, Resource Allocation in Ring networks with Spatial Reuse, MITACS Fourth Annual Conference May 8-10, 2003. (Third Level Prize)

Y. Tang, Bounds for Frequency Estimation on Packet Stream, MITACS Fourth Annual Conference May 8-10, 2003.

J. Wang, Staffing a Call Center with Impatient Customers, MITACS Fourth Annual Conference May 8-10, 2003.

Z. Xu, Packet Forwarding With the Help of Comb Extraction Scheme, MITACS Fourth Annual Conference May 8-10, 2003.

- Lectures

- 2004

J. Li, Performance Evaluation of the Radio Link Control Protocol in 3G UMTS, Nortel Networks, Ottawa, March, 2004.

K. Navaie, Cross-Layer Optimization for Next Generation Cellular CDMA Networks, Nortel Networks, Ottawa, March, 2004.

K. Navaie, Cross-Layer Optimization for QoS Constrained Data Services in Next Generation Cellular CDMA Networks, Nortel Networks, Ottawa, March 2004.

Q. Wang, In-Sequence SDU Delivery Delay in RLC Layer of a UMTS, Nortel Networks, Ottawa, March 2004.

 





                                                        Maintained by Michel Barbeau     Copyrights@CANCCOM 2010    Last modified: March 2010