In Progress
Timothy Banjo,
synchronous Leader Election in Simulated Programmable Matter.
Dimitry Ivanov,
Analysis of the Average Performance of the Distributed Coloring Algorithm “Reduce” with Randomized Identifiers
2022
-
Nicholas Zubrisky, Simulating MASTER: A Centralized Router and Scheduler for Low Power Wireless Networks
2021
-
Zac Zhuang, The automatic crowded group (social distance) detection algorithm
-
Jie Ren, To Fill or Not to Fill: The Gas Station Problem.
-
Ryan Kane, Team Orienteering Routing on Real-World Graph structures
2020
-
Ethann Yakabuski,
A Better COVID-19 Era Elevator Algorithm
-
Zehui Wang, Covid-19 Case Simulator
-
Liyongshi Chen, Attacker's IP Geolocation System
-
Cameron Jones, Minimum Beacon Nodes for Graph
Localizability
-
Gavin Jackson, Automatons in Action – Exploring a Solution to Nest Building
2019
-
Kevin Guy, Accident Investigation Kit
-
Arthur Morris, An analysis and implementation of sublinear degree+1 graph colouring.
-
Cheldon Mahon, Implementation of Approximate Neighbour Counting in Radio Networks.
-
Nicolas Perez, Evacuating Two Robots in a Disk via Unknown Exit with the Robots Starting at Random Locations
-
Michael Berthelot, Adversarial Opinion Dynamics
2018
-
Michael Donally, Local Clusters.
-
Nolan Hodge, The Error Within GPS Distance Calculation.
2017
-
Elyas Syoufi,
Remote E-mail Acquisition using Available Browser Sessions.
-
Philip Klostermann,
Time and Energy Trade-offs in evacuating Robots via an Unknown Exit on a Disk.
-
Devin Savage. Graph Patrolling with Faulty Robots.
-
Michael Van Dyk, Minimizing the Maximum Sensor Movement for Barrier Coverage of a Line Segment with Disjoint Sub-Intervals.
2016
-
Fan Zhang, Simulation of the Modular Clock Algorithm for Distributed Blind Rendezvous.
-
Andrew Otsuki.
Creating a Minimum Viable Blockchain.
-
Owen MacWilliam.
Private Social Network Model For Risk Reduction of Location and Identity Sharing
2015
-
Kevin Mason,
A survey on Search and Rescue Strategies Utilizing Robot Swarms.
-
Jasmin Mehic,
Improving Password-Guessing by Generating Personalized Target Profiles.
-
Dongfeng Gu,
A Survey of Approaches in Oblivious Rendezvous
-
Ransheng Lu,
Efficient Algorithms for Characteristic Wireless Power Transfer Problems in Sensor Networks
2014
-
Aziz Alahmdi,
On Weighted Rooted Tree.
-
Mathew Scott Collins,
Max-Flow and Min Cut by Circular Zone Failures Between Protected Communication Endpoints Applied to Geographically Based Networks.
-
Tianwei Zhang,
Scalable and Reliable Search Mechanism for Unstructured P2P Networks.
-
Josh Brach,
Elastic Collisions of Particles
on a One Dimensional Domain
with Unrestricted Masses.
-
Evan Huus,
Knowledge in Rendezvous of Agents with Different Speeds
2013
-
Sylvia Zhao,
Counting in Anonymous Dynamic Networks: An Experimental Perspective
-
Qi Zhang,
Barrier Coverage in Camera Sensor Networks
-
Andrew Soknaski,
Various Ways of Detecting Sybil Attacks
-
Yunus Ozserver,
Distributed Coloring Depending on the
Chromatic Number or the Neighborhood Growth
-
Jing Zhang,
Efficient Cardinality Estimation in Wireless Sensor Networks
-
Ahmed Kaisar,
Distributed Geometric Distance Estimation
in Ad Hoc Networks
2012
-
Wiktor Kula,
Algorithms and Techniques For Protein Structure Prediction.
-
Chen Xi,
Location leaks on the GSM air interface
-
Jean-Benoit Aubin,
Accountability of Sequence Numbers
-
Mike Austin.
Suitability of FM Radio Signals for Use in
Private Proximity Testing.
2011
-
Emmannuelle McCullough-Murray,
Bitcoin: A Sustainable Example of Cryptographic, Decentralized
Currency?
-
Yunpeng Liu,
Triangle Localization Algorithm Based on Received Signal Strength Indication.
-
Rakhim Davletkaliyev.
Solving classical problems in computational molecular biology using
distributed computing and web-technologies
2010
-
Jing Li,
Using Spatial Cloaking Algorithm to Protect Location Privacy
-
Saken Khudaibergenov, Mobile Sink Routing Problem
-
Jin Zhuo.
Using Algorithms to Solve Key Distribution Problem. Dec 2010.
-
Elmunir Elgajiji.
An Algorithmic Approach to Geographic Routing in Sensor Networks. Dec 2010.
-
Seyyed Sajjadpour,
Fuzzy Keyword search over Encrypted Data in Cloud Computing.
August 2010.
-
Cai Yangyang,
Cluster Based Routing in Socially Selfish Delay Networks.
August 2010.
-
Qiuliang Tang,
Protecting Sender-Location Privacy and Receiver-Location
Privacy in Wireless Sensor Networks.
August 2010.
-
Dongchao Chen,
Uncoordinated FHSS Anti-Jamming Communication.
April 2010.
2009
-
Yaozhong Sun,
Implementing the EAD Algorithm for Distributed Dynamic Storage in
Wireless Systems, August 2009.
-
Leung Ah Kang, Pak Him,
Cross-Site Scripting (CSS) Attacks and Countermeasures, April 2009.
2007
-
Mohammed Rashid, Localization in Sparse Networks Using Sweeps,
December 2008.
-
Brenda Mohan,
Location Verification in Wireless Networks, August 2007.
-
Liming Hu,
Exploration and Implementation of Active Cookies, August 2007.
-
Fei Fei Wang, Pseudoknots and RNA Secondary Structures,
August 2007.
-
Mike Radzichowsky,
Exploration of Techniques to Combat Low-Rate TCP Targeted DoS Attacks,
Augustl 2007.
-
Dave Gaffney,
Clone Detection in Sensor Networks : A Survey,
August 2007.
-
Gregory Wolgemuth,
Providing Linux Distribution Updates through Bittorrent,
April 2007.
-
Andrew Price,
Embedded Collection of Vehicular Sensor Data,
April 2007.
-
Xibin Liu,
Comparative Study of Algorithms for Boundary
Recognition in Wireless Sensor Networks,
April 2007.
-
Todd Switzer,
Network Time Zone Discovery and Applications,
April 2007.
-
Yu Zeng,
A New Challenge to P2P File Sharing Networks: Free Riding,
April 2007.
-
Shuai Tan,
Implementation of a Reputation System for Peer-to-Peer Networks,
April 2007.
2006
-
Shusen Zhang,
Content-Based Publish-Subscribe Systems in P2P Networks,
December 2006.
-
Eldai El Sayr,
Routing with Uncertainty in the Position of the Destination in Ad Hoc Networks,
December 2006.
-
Xiofan Yang,
P2P Network and its Application with Distributed Hash Tables,
December 2006.
-
Song Qiang Feng,
Beacon Based BVR for Wireless Sensor Network, August 2006.
-
Xiaowei Zhou,
Host-Based Intrusion Detection, August 2006.
-
Wenying Huang,
Scalable Overlay Network on P2P Systems,
August 2006.
-
Jianfeng Chen,
Mobicast via Face-Aware Routing,
August 2006.
-
Brian Fetter,
Potential Concealment of Network Worms via Probe Response Attacks,
April 2006.
-
Yingquan Gong, Simulation of Route Discovery Algorithm
in Oriented Planar Geometric Networks.
April 2006.
-
Lance Lau,
Selective Target Acquisition Attacks Utilizing Major
Internet Infrastructures.
April 2006.
-
Min Lin,
Fully Distributed Cluster Based Routing
Architecture for Mobile Ad Hoc Networks.
April 2006.
-
Jingxia Liu,
Detecting and Locating Rogue Access Points.
April 2006.
-
Guong Nguyen,
Quickly Routing Searches without Having to Move Content.
April 2006.
-
John Tang,
Theories of Cut Set Computation and a New Algorithm to
Enumerate all Minimal Cut Sets of a Graph.
April 2006.
-
Rong Wang,
Friends Troubleshooting Network.
April 2006.
2005
-
Joel Nye,
Triangulation in Sensor Networks: With Applications in
Search and Rescue,
December 2005.
-
Michael Vong,
Local SMS messaging to a Mobile Device Routed through Bluetooth,
December 2005.
-
Farzana Mowla,
A Study and Analysis of Proxy Re-encryption Schemes
with Applications to Secure Distributed Storage,
December 2005.
-
Qu Shan,
Re-key and Storage Cost for Secure Group User Revocation,
December 2005.
-
Han Li, P2P Networking Defines the Future for
Communication in the Corporation, August 2005.
-
Owen Marsh, Using BitTorrent to Cost Effectively Address
the Effects of Flash Crowds, August 2005.
-
Ke Li, Security of Hash Functions, August 2005.
-
Chao Zhan,
A Survey of Scalable Search in P2P Networks, August 2005.
-
Xiaoju Ji,
Distributed DoS Attack and Defense Mechanisms and Evaluation of
Router Based Packet Filtering,
August 2005.
-
Kai Huang,
WiseMAC: an Ultra Low Power MAC Protocol for Multi-hop Wireless Sensor Networks,
August 2005.
-
Robert Fortier, Port Lockset, August 2005.
-
Gordon Lo,
Fair Content Sharing of P2P Resources, April 2005.
-
Toan Nguyen,
Implementatiom of Efficient Data Collection Trees in
Sensor Nerworks with Redundancy Removal, April 2005.
-
Kevin Wong,
Gossip Algorithms for Mobile Ad Hoc Networks, April 2005.
2004
-
Yu Han,
Distance Optimization and Load Balancing on a P2P
Content Distribution Network, December 2004.
-
Getached Woldeyey, Scalable and Continuous Media Streaming in P2P
networking, December 2004.
-
Tanya Chernyaeva,
Efficient Search in Self-Organizing Structured P2P Systems.
August 2004.
-
Ryan Dadswell,
Nemesis: An Anonymous Secure and Fair P2P Network.
August 2004.
-
William D'Arbelles, Incentives for Cooperation in P2P Systems.
August 2004.
-
Maryam Daraibaf,
Testing C Programs for Buffer Overflow Vulnerabilities.
August 2004.
-
Mike Gardiner, Trusted Decentralized Messaging.
August 2004.
-
Chi Fung Lo, Timed-Release Cryptography,
August 2004.
-
Shiva Poursina,
Multi Level Security (MLS): Problems and Solutions Proposed.
August 2004.
-
Ting Ting Yan,
Design the Secure Kerberos Protocol with Authenticated Encryption
August 2004.
-
Rika Ajar,
SPAM Filtering Techniques: Statistical Approach vs Encapsulation
of Policies in Email Addresses,
January 2004.
-
Doug Devries,
Evaluating a Method to Support Non-GPS Equipped
Nodes in a Network, April 2004.
-
Michael Imbrogno,
Deepseek: A Structured P2P Information Retrieval Service,
April 2004.
-
Matthew Ostime,
Sensing Structural Changes with Wireless Networks,
April 2004.
-
Clint Paget,
Protecting Software from Malicious Hosts: A Unified Approach.
April 2004.
-
Matthew Prince,
Minimum Energy Broadcasting in Wireless Adhoc Networks:
Comparative Analysis and Simulation.
April 2004.
-
Eduardo Ramos, Active Worm Propagation: Modeling and
Analysis, April 2004.
-
Ken Tso,
Buffer Overflow: Analysis, Attacks and Defences.
April 2004.
-
Tian Yuan, An Innovative Way of Searching in P2P Networks,
April 2004.
2003
-
Nabeela Ali,
Peer-to-Peer Network and Availabilty, December 2003.
-
Adam Aggour, Protocols for Certified Electronic Mail,
April 2003.
-
Qi Deng,
High Availability Platform of On-line Lottery System,
April 2003.
-
Andy Gullins,
Secure Distributed Instant Messaging,
April 2003.
-
Huyn-Chung (Grace) Jo, Image Based Password Systems,
April 2003.
-
Nikos Kafenzakis, WEP Attack: An Analysis and Simulation,
April 2003.
-
Nolan MacAfee, An In-Depth Look at Bluetooth,
April 2003.
-
Rob Manor, Tweekable Block Ciphers,
April 2003.
-
Greg Mitchel, A Comparative Security Analysis of Cable
and DSL Internet Access Technologies, April 2003.
2002
-
Trung Mai, Web Network Characteristics, December 2002.
-
Ngoc Nhi Do,
Building Secure Channels with Universal Composition of
Key Exchange Protocols, September 2002.
-
Meijuan Zhu,
Development of Simulation Engine for Location Management
in Infrastructure Wireless Networks, August 2002.
-
Xuejun Zhang,
Research in Clustering Technique on Web Searching Engines,
August 2002.
-
Darryl Pinto,
Comparison Study of Intra-Domain Routing Protocols,
April 2002.
-
Ayla Khan,
Security of 802.11 LANs,
April 2002.
-
Hua Li,
Overview of Dynamic Packet Transport Technology,
April 2002.
-
Suguru Kanbayashi,
QoS and The Next Generation Internet,
April 2002.
-
Guoming Wei,
Simulation of Tunneling and Routing Optimization in
Mobile IP,
April 2002.
2001
-
John Duffy,
The Source of Insecurity for 802.11 Networks:
The Wired Equivalent Protocol, Dec 2001.
-
Andrew McCormack,
Lifting Elliptic Curves and Points for the Xedni Calculus Algorithm,
Dec 2001 (co-supervised with Saban Alaca).
-
Kieu Kim Huynh,
Handover Scheme in Bluetooth Networks,
December 2001.
-
Doc Duy Do,
Optimal Frame Transmission over Continuous Media Streams,
December 2001.
-
Thanh Pham,
Virtual Private Network,
December 2001.
2000
-
Han-Yuen Ong,
Distributed Instant Messaging,
December 2000.
-
Ting Li,
Recent Advances in Gigabit Networks,
August 2000.
-
Bao-Luan Nguyen,
Component Based Technologies: A New Way of Building
Applications. August 2000.
-
Jason Ramsay,
Elliptic Curve Cryptosystems: From Theory to
Implementation, August 2000 (co-supervised with
Saban Alaca).
-
Tyler Tidman, A Study of Security in Online Elections,
August 2000.
-
Andrew Belo,
Object Based Protection in Public Key Infrastructure,
April 2000.
-
Amy Lin,
A Study on Access Protocol for Multihop Radio Network,
April 2000.
-
Dimitri Nekrasovski,
Electronic Cash Payement Systems,
April 2000.
-
Hui An Nguyen,
Voice over IP Networks,
April 2000.
-
Nguyen Ha Phung Tran,
ATM Switch Design Principles,
April 2000.
-
Dana Webber,
Autosurf,
April 2000.
-
Ivan Wallis,
Secure Course Management System,
April 2000.
1999
-
Jayamthy Balasingham,
Smart Card: A Detail Analysis, Dec 1999.
-
Oanh Thuy Le,
Random Number Generation and Applications Using
Random Numbers, Dec 1999.
-
Steve Rycroft,
Asynchronous Network Discovery Using ICMP and SNMP,
June 1999.
-
Jeyanthi Hall, Web-Based Implementation of Electronic
Commerce, May 1999.
-
Jiang Wang,
Survey on Mobile IP,
May 1999.
-
Khoi Tan Doan,
TCP Congestion Control Algorithms,
May 1999.
-
Bruce Hastie,
Java Security on the Web,
May 1999.
1998
-
David Kantymir, Conference Mail:
Gatewaying to Internet Mailing List
to a WWW Message Board,
August 1998.
-
Jaison Dolvane, Electronic Payment Systems,
April 1998.
-
Greg Cwintal, Extension Components Development Technique,
April 1998.
-
Renata Urbaniak, Pricing the Internet: Survey of Proposed Solutions,
April 1998.
1997
-
Pino Caracciolo,
Security on the Internet,
Sep 1997.
-
Van Nguyen Tran,
Design and Performance Analysis of the Packet Radio Network,
April, 1997.
-
Brian Wesley Maither,
Electronic Commerce on the Internet:
Using Cryptographic Methods to Support Secure
Electronic Transactions,
April, 1997.
1996
-
Jason Muise,
Design and Applications of Smart Cards,
December 1996.
-
Chiang Tan,
Traffic Management and Congestion Control in ATM Networks,
April 1996.
-
Thinh Van Dao,
ATM in Broadband Telecommunication,
April 1996.
1995
-
Kin-Cheung (Ken) Chan,
Cryptography and Applications,
August 1995.
-
Shaorun Li,
Interval Routing Schemes in Communication
Networks, Jan 1995.
1994
-
C. Goodall,
LL(1) Parser Generator: Construction and Use,
August 1994.
-
George Jost,
Worst-Case Performance of Approximate on
Line Algorithms to the Classical Bin-Packing Problem,
August 1994.
-
Min Jing,
Self-Stabilization and Wake-up Problem,
March 1994.
1993
-
Laurie Ireland,
Businesses Need for Document Management
Systems: An Overview,
December 1993.
1992
-
Robin A. S. Sagriff,
Berlekamp's Light-Bulb Game, December 1992.
|