ISI Technical Reports

This section contains all Technical Reports published by ISI over the past several decades. The search box below enables searches by report titles, authors and report numbers. Technical Reports written by ISI researchers, but not published by ISI, may be available through the author’s individual website.

Journal articles and other publications can be found here.

Integration of Authority Mode hardware extensions with SecureCore software architecture to enable transient trustG. Bhaskara, T. E. Levin, P. C. Clark, T. D. Nguyen, C. E. Irvine, and T. V. Benzel
March, 2007

Studying the Spatial Correlation of Loss Patterns Among Communicating Wireless Sensor NodesM. Z. Murtaza, J. Heidemann, and F. Stann
March, 2007

Backward and Forward Bisimulation Minimisation of Tree AutomataJ. Högberg, A. Maletti, and J. M.
February, 2007

Bisimulation Minimisation of Weighted Tree AutomataJ. Högberg, A. Maletti, and J. M.
February, 2007

MAC Stability in Sensor Networks at High Network DensitiesS. T. McHenry and J. Heidemann
January, 2007

Trust based Approach for Improving Data Reliability in Industrial Sensor NetworksT. Ryutov and C. Neuman
January, 2007

Automated Management of Vulnerability Mitigation PrescriptionsT. Ryutov, C. Neuman, and R. Shah
January, 2007

Situational Identity: a Person-centered Identity Management ApproachT. Ryutov and C. Neuman
January, 2007

Experimental Study of Transmission Power Control and Blacklisting Based Link Quality Control in Wireless Sensor NetworksD. Son, B. Krishnamachari, and J. Heidemann
January, 2007

Design Principles for SecurityBenzel, T. V., Irvine, C. E., Levin, T. E., Bhaskara, G., Nguyen, T. D., and Clark, P. C.
November, 2006