scispace - formally typeset
Search or ask a question
Institution

North Carolina State University

EducationRaleigh, North Carolina, United States
About: North Carolina State University is a education organization based out in Raleigh, North Carolina, United States. It is known for research contribution in the topics: Population & Thin film. The organization has 44161 authors who have published 101744 publications receiving 3456774 citations. The organization is also known as: NCSU & North Carolina State University at Raleigh.


Papers
More filters
Proceedings ArticleDOI
19 Apr 2009
TL;DR: The performance study using using SLAW generated traces indicates that SLAW is effective in representing social contexts present among people sharing common interests or those in a single community such as university campus, companies and theme parks.
Abstract: Simulating human mobility is important in mobile networks because many mobile devices are either attached to or controlled by humans and it is very hard to deploy real mobile networks whose size is controllably scalable for performance evaluation. Lately various measurement studies of human walk traces have discovered several significant statistical patterns of human mobility. Namely these include truncated power-law distributions of flights, pause-times and inter-contact times, fractal way-points, and heterogeneously defined areas of individual mobility. Unfortunately, none of existing mobility models effectively captures all of these features. This paper presents a new mobility model called SLAW (self-similar least action walk) that can produce synthetic walk traces containing all these features. This is by far the first such model. Our performance study using using SLAW generated traces indicates that SLAW is effective in representing social contexts present among people sharing common interests or those in a single community such as university campus, companies and theme parks. The social contexts are typically common gathering places where most people visit during their daily lives such as student unions, dormitory, street malls and restaurants. SLAW expresses the mobility patterns involving these contexts by fractal way points and heavy-tail flights on top of the way points. We verify through simulation that SLAW brings out the unique performance features of various mobile network routing protocols.

567 citations

Proceedings ArticleDOI
31 Oct 2003
TL;DR: The analysis in this paper indicates that two pairwise key predistribution schemes can achieve better performance if such location information is available and that the smaller the deployment error is, the better performance they can achieve.
Abstract: Sensor networks are ideal candidates for applications such as target tracking and environment monitoring. Security in sensor networks is critical when there are potential adversaries. Establishment of pairwise keys is a fundamental security service, which forms the basis of other security services such as authentication and encryption. However, establishing pairwise keys in sensor networks is not a trivial task, particularly due to the resource constraints on sensors. This paper presents several techniques for establishing pairwise keys in static sensor networks. These techniques take advantage of the observation that in static sensor networks, although it is difficult to precisely pinpoint sensors' positions, it is often possible to approximately determine their locations. This paper presents a simple location-aware deployment model, and develops two pairwise key predistribution schemes, a closest pairwise keys predistribution scheme and a location-based pairwise keys scheme using bivariate polynomials, by taking advantage of sensors' expected locations. The analysis in this paper indicates that these schemes can achieve better performance if such location information is available and that the smaller the deployment error (i.e., the difference between a sensor's actual location and its expected location) is, the better performance they can achieve.

566 citations

Proceedings Article
31 Jul 2005
TL;DR: It is demonstrated that many real-world applications, including FTP, SSH, Telnet, and HTTP servers, are vulnerable to non-control-data attacks, and the importance of future research efforts to address this realistic threat is emphasized.
Abstract: Most memory corruption attacks and Internet worms follow a familiar pattern known as the control-data attack. Hence, many defensive techniques are designed to protect program control flow integrity. Although earlier work did suggest the existence of attacks that do not alter control flow, such attacks are generally believed to be rare against real-world software. The key contribution of this paper is to show that non-control-data attacks are realistic. We demonstrate that many real-world applications, including FTP, SSH, Telnet, and HTTP servers, are vulnerable to such attacks. In each case, the generated attack results in a security compromise equivalent to that due to the control-data attack exploiting the same security bug. Non-control-data attacks corrupt a variety of application data including user identity data, configuration data, user input data, and decision-making data. The success of these attacks and the variety of applications and target data suggest that potential attack patterns are diverse. Attackers are currently focused on control-data attacks, but it is clear that when control flow protection techniques shut them down, they have incentives to study and employ non-control-data attacks. This paper emphasizes the importance of future research efforts to address this realistic threat.

566 citations

Journal ArticleDOI
TL;DR: The purpose of the present paper is to relate the two in a way which the author thinks is meaningful and easy to grasp and to incorporate the role that the inbreeding and coancestry of individuals play in this variance.
Abstract: Inbreeding, gene frequency variance, and their corresponding effective population numbers are now commonplace terms in population genetics. The concepts and much of the theory are classical (Wright, 1921, 1931; Fisher, 1930). More recent refinements and extensions of the theory by Crow and associates (Crow, 1954; Crow and Morton, 1955; Kimura and Crow, 1963a, b) have been primarily concerned with distinguishing between the inbreeding effect on heterozygosity and on the variance of gene frequencies which are so intimately connected in finite populations. The purpose of the present paper is to relate the two in a way which the author thinks is meaningful and easy to grasp. Further, correlational measures are made compatible with probability measures of identity by descent and a simple basis is provided for the analysis of the variance of gene frequencies in experimental or natural populations. The procedure is to work with the variance of a linear function and to incorporate the role that the inbreeding and coancestry of individuals play in this variance. First, let us develop this role. We let aij index the jth allele in the ith individual and introduce a measure of frequency xij defined by

564 citations


Authors

Showing all 44525 results

NameH-indexPapersCitations
Yi Cui2201015199725
Jing Wang1844046202769
Rodney S. Ruoff164666194902
Carlos Bustamante161770106053
David W. Johnson1602714140778
Joseph Wang158128298799
David Tilman158340149473
Jay Hauser1552145132683
James M. Tour14385991364
Joseph T. Hupp14173182647
Bin Liu138218187085
Rudolph E. Tanzi13563885376
Richard C. Boucher12949054509
David B. Allison12983669697
Robert W. Heath128104973171
Network Information
Related Institutions (5)
University of Illinois at Urbana–Champaign
225.1K papers, 10.1M citations

96% related

Pennsylvania State University
196.8K papers, 8.3M citations

95% related

University of Maryland, College Park
155.9K papers, 7.2M citations

94% related

University of California, Davis
180K papers, 8M citations

94% related

Cornell University
235.5K papers, 12.2M citations

94% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
2023160
2022652
20215,262
20205,459
20194,888
20184,522