ISI Technical Reports

This section contains all Technical Reports published by ISI over the past several decades. The search box below enables searches by report titles, authors and report numbers. Technical Reports written by ISI researchers, but not published by ISI, may be available through the author’s individual website.

Journal articles and other publications can be found here.

Design and Analysis of a Propagation Delay Tolerant ALOHA Protocol for Underwater NetworksJ. Ahn, A. Syed, B. Krishnamachari, J. Heidemann,

Parametric Methods for Anomaly Detection in Aggregate TrafficG. Thatte, U. Mitra, and J. Heidemann
August, 2009

The Tetris SwitchS. Suryaputra, J. D. Touch, and J. Bannister
July, 2009

Using Low-Rate Flow Periodicities in Anomaly DetectionG. Bartlett, J. Heidemann, and C. Papadopoulos
July, 2009

Tones for Real: Managing Multipath in Underwater Acoustic Wakeup A. A. Syed, J. Heidemann, and W. Ye
April, 2009

Low-latency Synchronization of Loosely-coupled Sensornet RepublishingU. Park and J. Heidemann
April, 2009

Report on National Cyber Defense Initiative Industry Workshop Initiative Industry WorkshopP. Allor
March, 2009

A Narrative Perspective of Situation Awareness in Synthetic BattlespaceJ. M. Curiel and J. J. Tran
February, 2009

Understanding Address Usage in the Visible InternetX. Cai and J. Heidemann
February, 2009

Secure System Views: A New Paradigm for Secure Usable SystemsA. Viswanathan and C. Neuman
January, 2009