Institution
North Carolina State University
Education•Raleigh, North Carolina, United States•
About: North Carolina State University is a education organization based out in Raleigh, North Carolina, United States. It is known for research contribution in the topics: Population & Thin film. The organization has 44161 authors who have published 101744 publications receiving 3456774 citations. The organization is also known as: NCSU & North Carolina State University at Raleigh.
Topics: Population, Thin film, Gene, Context (language use), Computer science
Papers published on a yearly basis
Papers
More filters
••
Woods Hole Oceanographic Institution1, North Carolina State University2, San Francisco State University3, University of Maryland Center for Environmental Science4, Stony Brook University5, Florida Fish and Wildlife Conservation Commission6, University of California, Santa Cruz7, Florida Gulf Coast University8, University of Maine9, National Oceanic and Atmospheric Administration10, University of South Florida11
TL;DR: In some regions of the U.S., the linkages between HABs and eutrophication are clear and well documented, whereas in others, information is limited, thereby highlighting important areas for further research.
567 citations
••
19 Apr 2009TL;DR: The performance study using using SLAW generated traces indicates that SLAW is effective in representing social contexts present among people sharing common interests or those in a single community such as university campus, companies and theme parks.
Abstract: Simulating human mobility is important in mobile networks because many mobile devices are either attached to or controlled by humans and it is very hard to deploy real mobile networks whose size is controllably scalable for performance evaluation. Lately various measurement studies of human walk traces have discovered several significant statistical patterns of human mobility. Namely these include truncated power-law distributions of flights, pause-times and inter-contact times, fractal way-points, and heterogeneously defined areas of individual mobility. Unfortunately, none of existing mobility models effectively captures all of these features. This paper presents a new mobility model called SLAW (self-similar least action walk) that can produce synthetic walk traces containing all these features. This is by far the first such model. Our performance study using using SLAW generated traces indicates that SLAW is effective in representing social contexts present among people sharing common interests or those in a single community such as university campus, companies and theme parks. The social contexts are typically common gathering places where most people visit during their daily lives such as student unions, dormitory, street malls and restaurants. SLAW expresses the mobility patterns involving these contexts by fractal way points and heavy-tail flights on top of the way points. We verify through simulation that SLAW brings out the unique performance features of various mobile network routing protocols.
567 citations
••
31 Oct 2003TL;DR: The analysis in this paper indicates that two pairwise key predistribution schemes can achieve better performance if such location information is available and that the smaller the deployment error is, the better performance they can achieve.
Abstract: Sensor networks are ideal candidates for applications such as target tracking and environment monitoring. Security in sensor networks is critical when there are potential adversaries. Establishment of pairwise keys is a fundamental security service, which forms the basis of other security services such as authentication and encryption. However, establishing pairwise keys in sensor networks is not a trivial task, particularly due to the resource constraints on sensors. This paper presents several techniques for establishing pairwise keys in static sensor networks. These techniques take advantage of the observation that in static sensor networks, although it is difficult to precisely pinpoint sensors' positions, it is often possible to approximately determine their locations. This paper presents a simple location-aware deployment model, and develops two pairwise key predistribution schemes, a closest pairwise keys predistribution scheme and a location-based pairwise keys scheme using bivariate polynomials, by taking advantage of sensors' expected locations. The analysis in this paper indicates that these schemes can achieve better performance if such location information is available and that the smaller the deployment error (i.e., the difference between a sensor's actual location and its expected location) is, the better performance they can achieve.
566 citations
•
31 Jul 2005TL;DR: It is demonstrated that many real-world applications, including FTP, SSH, Telnet, and HTTP servers, are vulnerable to non-control-data attacks, and the importance of future research efforts to address this realistic threat is emphasized.
Abstract: Most memory corruption attacks and Internet worms follow a familiar pattern known as the control-data attack. Hence, many defensive techniques are designed to protect program control flow integrity. Although earlier work did suggest the existence of attacks that do not alter control flow, such attacks are generally believed to be rare against real-world software. The key contribution of this paper is to show that non-control-data attacks are realistic. We demonstrate that many real-world applications, including FTP, SSH, Telnet, and HTTP servers, are vulnerable to such attacks. In each case, the generated attack results in a security compromise equivalent to that due to the control-data attack exploiting the same security bug. Non-control-data attacks corrupt a variety of application data including user identity data, configuration data, user input data, and decision-making data. The success of these attacks and the variety of applications and target data suggest that potential attack patterns are diverse. Attackers are currently focused on control-data attacks, but it is clear that when control flow protection techniques shut them down, they have incentives to study and employ non-control-data attacks. This paper emphasizes the importance of future research efforts to address this realistic threat.
566 citations
••
TL;DR: The purpose of the present paper is to relate the two in a way which the author thinks is meaningful and easy to grasp and to incorporate the role that the inbreeding and coancestry of individuals play in this variance.
Abstract: Inbreeding, gene frequency variance, and their corresponding effective population numbers are now commonplace terms in population genetics. The concepts and much of the theory are classical (Wright, 1921, 1931; Fisher, 1930). More recent refinements and extensions of the theory by Crow and associates (Crow, 1954; Crow and Morton, 1955; Kimura and Crow, 1963a, b) have been primarily concerned with distinguishing between the inbreeding effect on heterozygosity and on the variance of gene frequencies which are so intimately connected in finite populations. The purpose of the present paper is to relate the two in a way which the author thinks is meaningful and easy to grasp. Further, correlational measures are made compatible with probability measures of identity by descent and a simple basis is provided for the analysis of the variance of gene frequencies in experimental or natural populations. The procedure is to work with the variance of a linear function and to incorporate the role that the inbreeding and coancestry of individuals play in this variance. First, let us develop this role. We let aij index the jth allele in the ith individual and introduce a measure of frequency xij defined by
564 citations
Authors
Showing all 44525 results
Name | H-index | Papers | Citations |
---|---|---|---|
Yi Cui | 220 | 1015 | 199725 |
Jing Wang | 184 | 4046 | 202769 |
Rodney S. Ruoff | 164 | 666 | 194902 |
Carlos Bustamante | 161 | 770 | 106053 |
David W. Johnson | 160 | 2714 | 140778 |
Joseph Wang | 158 | 1282 | 98799 |
David Tilman | 158 | 340 | 149473 |
Jay Hauser | 155 | 2145 | 132683 |
James M. Tour | 143 | 859 | 91364 |
Joseph T. Hupp | 141 | 731 | 82647 |
Bin Liu | 138 | 2181 | 87085 |
Rudolph E. Tanzi | 135 | 638 | 85376 |
Richard C. Boucher | 129 | 490 | 54509 |
David B. Allison | 129 | 836 | 69697 |
Robert W. Heath | 128 | 1049 | 73171 |