... 2) [t]: Timestamp of when the event took place. 3) [SID]: Segment Identifier is the hash valu... more ... 2) [t]: Timestamp of when the event took place. 3) [SID]: Segment Identifier is the hash value of the data segment using SHA-256. 4) [NID]: The identifier of reporting node, which should be unique across the whole community. 5) [MSG SEG]: The actual message segment. ...
Abstract Wireless Sensor Networks (WSNs) operate with varying duty cycles to meet their applicat... more Abstract Wireless Sensor Networks (WSNs) operate with varying duty cycles to meet their application-specific criteria such as the availability, reliability, and the life expectancy of the system. This variation in duty cycle consequently affects the system characteristics ...
The growth in use of medical imaging resulted in great challenges, such as handling, storing, ret... more The growth in use of medical imaging resulted in great challenges, such as handling, storing, retrieving and transmitting biomedical images. The Health Information Technology for Economic and Clinical Health (HITECH) Act went into effect in February 2010 [1]. The ...
… on Privacy, Security, Risk and Trust, Jan 1, 2010
Abstract The explosion of medical image usage in clinical and research domains brings us a great ... more Abstract The explosion of medical image usage in clinical and research domains brings us a great challenge of securely handling, storing, retrieving and transmitting biomedical images. Medical images are often large files and they have to be stored for a long time if they are ...
Network Security, Administration and …, Jan 1, 2011
Japanese Embassy. The transmission began at 1:28 am and was complete by 1:37 am At 7:58 am an ale... more Japanese Embassy. The transmission began at 1:28 am and was complete by 1:37 am At 7:58 am an alert was raised, Air Raid, Pearl Harbor. This is Not a Drill! A few hours later, the American Pacific Fleet lay decimated (Kahn, 1967). American code breakers, having gained techni- ...
4.5 Quality of Service in Packet-Switched Networks Stan McClellan and Remzi Seker This chapter di... more 4.5 Quality of Service in Packet-Switched Networks Stan McClellan and Remzi Seker This chapter discusses several technologies and concepts that are important in the provisioning of" Quality of Service"(QoS) in packet-switched networks. Unfortunately," QoS" is an overloaded term ...
AbstractLarge-scale organizations often use role-based hi-erarchical systems for managing human ... more AbstractLarge-scale organizations often use role-based hi-erarchical systems for managing human resources. Meanwhile, secure communication is an essential element in protecting an organization's intellectual property. In this paper, we propose a solution to ...
Abstract The existing definitions for infrastructure notion do not seem to completely capture i... more Abstract The existing definitions for infrastructure notion do not seem to completely capture its impact, outreach, and the importance of entities it represents. Thorough understanding of the concept is necessary if we are to develop long-lasting adaptive infrastructures, which ...
Abstract Efforts to integrate independently developed software components, to a large extent, hav... more Abstract Efforts to integrate independently developed software components, to a large extent, have not been successful. Effective integration requires that component models agree on at least two different levels: wiring-level connectivity and semantic-level compatibility. ...
AbstractBuilding a secure group communication system is an active research topic. Several studie... more AbstractBuilding a secure group communication system is an active research topic. Several studies have focused on achieving a good level of privacy among a group of people via agreement on a shared encryption key. However, there is not much work published on easily ...
Abstract The existing definitions for infrastructure notion do not seem to completely capture i... more Abstract The existing definitions for infrastructure notion do not seem to completely capture its impact, outreach, and the importance of entities it represents. Thorough understanding of the concept is necessary if we are to develop long-lasting adaptive infrastructures, which ...
… Workshop, 2005. 29th Annual IEEE/NASA, Jan 1, 2005
Embedded systems are special purpose computer systems whose functions are implemented, controlled... more Embedded systems are special purpose computer systems whose functions are implemented, controlled and managed by dedicated software. Due to the computational power, speed, and flexibility provided by software implementation of the system functions, ...
6. ACKNOWLEDGEMENTS This work was funded in part, by grants from the National Science Foundation ... more 6. ACKNOWLEDGEMENTS This work was funded in part, by grants from the National Science Foundation (CNS-0619069) and Acxiom Corpora-tion (# 281539) 7. REFERENCES [I] W3C Recommendation, 2004, OWL Web Ontology Language Reference, at http://www.w3.org/ ...
R. Seker, AJ van der Merwe, P. Kotze, MM Tanik, R. Paul, Assessment Of Coupling And Cohesion For ... more R. Seker, AJ van der Merwe, P. Kotze, MM Tanik, R. Paul, Assessment Of Coupling And Cohesion For Component-Based Software By Using Shannon Languages, Journal of Integrated Design & Process Science, v. 8 n. 4, p. 33-43, December 2004
... 2) [t]: Timestamp of when the event took place. 3) [SID]: Segment Identifier is the hash valu... more ... 2) [t]: Timestamp of when the event took place. 3) [SID]: Segment Identifier is the hash value of the data segment using SHA-256. 4) [NID]: The identifier of reporting node, which should be unique across the whole community. 5) [MSG SEG]: The actual message segment. ...
Abstract Wireless Sensor Networks (WSNs) operate with varying duty cycles to meet their applicat... more Abstract Wireless Sensor Networks (WSNs) operate with varying duty cycles to meet their application-specific criteria such as the availability, reliability, and the life expectancy of the system. This variation in duty cycle consequently affects the system characteristics ...
The growth in use of medical imaging resulted in great challenges, such as handling, storing, ret... more The growth in use of medical imaging resulted in great challenges, such as handling, storing, retrieving and transmitting biomedical images. The Health Information Technology for Economic and Clinical Health (HITECH) Act went into effect in February 2010 [1]. The ...
… on Privacy, Security, Risk and Trust, Jan 1, 2010
Abstract The explosion of medical image usage in clinical and research domains brings us a great ... more Abstract The explosion of medical image usage in clinical and research domains brings us a great challenge of securely handling, storing, retrieving and transmitting biomedical images. Medical images are often large files and they have to be stored for a long time if they are ...
Network Security, Administration and …, Jan 1, 2011
Japanese Embassy. The transmission began at 1:28 am and was complete by 1:37 am At 7:58 am an ale... more Japanese Embassy. The transmission began at 1:28 am and was complete by 1:37 am At 7:58 am an alert was raised, Air Raid, Pearl Harbor. This is Not a Drill! A few hours later, the American Pacific Fleet lay decimated (Kahn, 1967). American code breakers, having gained techni- ...
4.5 Quality of Service in Packet-Switched Networks Stan McClellan and Remzi Seker This chapter di... more 4.5 Quality of Service in Packet-Switched Networks Stan McClellan and Remzi Seker This chapter discusses several technologies and concepts that are important in the provisioning of" Quality of Service"(QoS) in packet-switched networks. Unfortunately," QoS" is an overloaded term ...
AbstractLarge-scale organizations often use role-based hi-erarchical systems for managing human ... more AbstractLarge-scale organizations often use role-based hi-erarchical systems for managing human resources. Meanwhile, secure communication is an essential element in protecting an organization's intellectual property. In this paper, we propose a solution to ...
Abstract The existing definitions for infrastructure notion do not seem to completely capture i... more Abstract The existing definitions for infrastructure notion do not seem to completely capture its impact, outreach, and the importance of entities it represents. Thorough understanding of the concept is necessary if we are to develop long-lasting adaptive infrastructures, which ...
Abstract Efforts to integrate independently developed software components, to a large extent, hav... more Abstract Efforts to integrate independently developed software components, to a large extent, have not been successful. Effective integration requires that component models agree on at least two different levels: wiring-level connectivity and semantic-level compatibility. ...
AbstractBuilding a secure group communication system is an active research topic. Several studie... more AbstractBuilding a secure group communication system is an active research topic. Several studies have focused on achieving a good level of privacy among a group of people via agreement on a shared encryption key. However, there is not much work published on easily ...
Abstract The existing definitions for infrastructure notion do not seem to completely capture i... more Abstract The existing definitions for infrastructure notion do not seem to completely capture its impact, outreach, and the importance of entities it represents. Thorough understanding of the concept is necessary if we are to develop long-lasting adaptive infrastructures, which ...
… Workshop, 2005. 29th Annual IEEE/NASA, Jan 1, 2005
Embedded systems are special purpose computer systems whose functions are implemented, controlled... more Embedded systems are special purpose computer systems whose functions are implemented, controlled and managed by dedicated software. Due to the computational power, speed, and flexibility provided by software implementation of the system functions, ...
6. ACKNOWLEDGEMENTS This work was funded in part, by grants from the National Science Foundation ... more 6. ACKNOWLEDGEMENTS This work was funded in part, by grants from the National Science Foundation (CNS-0619069) and Acxiom Corpora-tion (# 281539) 7. REFERENCES [I] W3C Recommendation, 2004, OWL Web Ontology Language Reference, at http://www.w3.org/ ...
R. Seker, AJ van der Merwe, P. Kotze, MM Tanik, R. Paul, Assessment Of Coupling And Cohesion For ... more R. Seker, AJ van der Merwe, P. Kotze, MM Tanik, R. Paul, Assessment Of Coupling And Cohesion For Component-Based Software By Using Shannon Languages, Journal of Integrated Design & Process Science, v. 8 n. 4, p. 33-43, December 2004
Uploads
Papers by Remzi Seker