Statistics & Computer Science: Recent submissions

  • Weerasinghe, K.G.H.D.; Elhajj, I.; Krsteva, A.; Najm, M.A. (IEEE/ASME International Conference, 2007)
    This paper presents and evaluates a data centric adaptive in-network aggregation algorithm for wireless sensor networks. In-Network data aggregation is used in wireless sensor networks to reduce the power consumption of ...
  • Dustin, M.; Shankarappa, J.; Petrowski, M.; Weerasinghe, K.G.H.D.; Fu, H. (IEEE EIT?07, 2007)
    A multitude of wireless sensor networks exist today in various fields, each having a specific objective in mind. Based on the objectives for each network, the security concerns can be different, dependent on such factors ...
  • Weerasinghe, K.G.H.D.; Fu, H. (GLOBECOM Workshops (GC Wkshps), 2010 IEEE, 2010)
    Security mechanisms such as authentication, message integrity, and non-repudiation are extremely important features for both vehicle-to-vehicle and vehicle-to-infrastructure communications in vehicular ad hoc networks. ...
  • Weerasinghe, K.G.H.D.; Fu, H.; Leng, S. (Information Assurance and Security (IAS), 2010 Sixth International Conference, 2011)
    Communications through road side units in Vehicular Ad hoc Networks (VANETs) can be used to track the location of vehicles, which makes serious threat on users' privacy. In this paper, we propose and evaluate a novel ...
  • Jin, K.; Weerasinghe, K.G.H.D.; Fu, H. (Proceedings of 43rd Annual Simulation Symposium (ANSS), 2010)
    Ns-2 is being widely utilized to evaluate the wired and wireless networks on many research activities. The ns-2.33 distribution version includes an extension of IEEE 802.11 module which improves the core functions of 802.11 ...
  • Weerasinghe, K.G.H.D.; Fu, H. (International Journal of Software Engineering and Its Applications, 2008)
    A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route requests without having active route to ...
  • Wang, Q.; Leng, S.; Fu, H.; Zang, Y.; Weerasinghe, K.G.H.D. (INFOCOM IEEE Conference on Computer Communications Workshops, 2010)
    This paper proposes a multi-channel MAC scheme for Vehicular Ad Hoc Networks (VANETs), which dynamically adjusts the intervals of Control Channel (CCH) and Service Channels (SCHs). Markov modeling is conducted to optimize ...
  • Weerasinghe, K.G.H.D.; Tackett, R.; Fu, H. (Security and Communication Networks, 2011)
    In the near future, vehicle-to-vehicle and vehicle-to-roadside infrastructure communications will enable numerous applications, such as collision avoidance, traffic management, location-based services, and infotainment for ...
  • Weerasinghe K G H D (Thesis (Ph.D.)--Oakland University, 2011)
    Because of the large number of deaths, severe injuries and huge financial loss due to auto accidents and poor traffic management, road safety and traffic management have become very important areas of interest among research ...
  • Weerasinghe, K.G.H.D.; Huirong, F. (Intelligence and Security Informatics (ISI), 2011 IEEE International Conference, 2011)
    Communication messages in Vehicular Ad-hoc Networks (VANETs) can be used to track movement of vehicles. In this paper, we address the problem of movement tracking and enhance location privacy without affecting security and ...
  • Herrath, H.M.P.S.; Wijayanayake, W.M.J.I. (2007)
    The use of Information and Communication Technology (ICT) is on the increase and encompasses nearly the entire business process of Financial Industry. In this industry the rising competition and customer expectations have ...
  • Wickramarachchi A P R; Malavisooriya L M (2006)
    The need for perusing sound business practices when adopting an organizational web strategy is highlighted by many authors. Measuring effectiveness of business activities is a standard practice of any organization. However, ...

Search Digital Repository


Browse

My Account