Monday 7 November 2011

Introduction & some important concepts



HUMAN COMPUTER INTERACTION






 

CONCEPT OF TASK ANALYSIS

Task: A task is a goal having some specific order of actions to achieve some goal and if we talk about the task analysis it is simply the method to analyze the people jobs that what are they doing why are they doing and what is the result if against their actions.
Simply in task analysis we have to analyze people or some agents that perform some work on a specific domain or application of their work system in order to obtain or achieve their goal.

HIERARCHICAL TASK ANALYSIS

The above stated diagram shows the concept of HTA i.e. hierarchical task analysis it is the concept in which we study the entire system of actions more closely how it performs action to accomplish the different task in order to achieve the goal more in this analysis we study the about what the task requirement is the environment of the task and the behavior.

GOMS

The abbreviation of GOMS is Goal Operated Method of Selecting Roles where goal is what the user wants to achieve from a system or the operation they do perform and the method is about to split your goal or task into sub goals that helps to determine the things more closely “what to do” and “How to do it” and the selection of the methods at the best of his level according to accomplish the task more effectively and accurately.
NEED OF GOMS
Well as defined above in the definition of goms we have to follow goms rules for an interactive design of an application and to provide complete feedback for the users who have some issues regarding the application or the interface we design this goms methods solve to many problems like if there is an application or a software that records inventory and it’s a complete financial application so the user have to know that where should they start using it and how to record the inventory and other financial transaction that creates right effect to the company financial statement then we provide it some guideline no manner that it would base upon interactive video or just a help file.

WATERFALL MODEL

The waterfall model that is in the Design process describes the waterfall model is a sequential design process, often used in software development processes, in which progress is seen as flowing steadily downwards (like a waterfall) through the phases of Conception, Initiation, Analysis, Design, Construction, Testing, Production Implementation and Maintenance.
This model describe very important things that includes the need of the system you are going to design, How the system in going to help or assist the users which you are going to design, some detailed design and usability references, then we have to test the each unit of the software because sometime the software we are going to design is performing the task in different chunks of information so we have to test each of the unit, Integration and testing in which we add some help guidelines and then error handling of the software.

INTERACTIVE SYSTEM LIFECYCLE

The only difference of Waterfall model and Interactive system life cycle is we cannot assume the linear system feedback in the interactive system lifecycle there is a lot of feedback in this system cycle that’s why this design is different from the tradition interactive system lifecycle.
USAGE:
We can use this design model when we are designing any application or computerized system for any organization I think that this will help and assist the designer a lot to understand the organizational task and the behavior of the agents that are performing several different task to achieve the goal.

STAKEHOLDERS

Stakeholders are the persons who are related to the systems success or the failure of the system the system will have many stakeholders of different types.
                                                         i.            Primary
                                                        ii.            Secondary
                                                      iii.            Tertiary
                                                      iv.            Facilitating

SOFTWARE GUIDELINES

There are the few screenshots of the software that is Intuit Quickbooks used for record keeping and financial record keeping in organizations.

USABILITY CONCEPT

The term usability determines that how any product can be used by the users that are using this product in order to achieve some specific goals.
Here we talk about the Mobile phone so the purpose of mobile phone is to make calls and send text messages nothing except this so the main usability of the mobile phone is to make calls and sending the text messages this is the prior goal of this product. Now we come into the properties of the usability of the mobile phone i.e. a product that is a mobile a user who uses and experience the mobile phone for making calls and text messages, the task and the set of task that is similar which is defined above and the goal this is making a calls. The next thing is the criteria of usability may change or subject to change according to time and requirement for instance in late times we only have cell phone that did only task as prescribed above but now these phones turned to be an smartphone like sending mails and using the office applications as well.

PRINCIPALS OF USABILITY

There are three principals of usability that are learnability the ease of using the system and achieve the maximum from it this principal applied to the Mobile phone then the ease of using the system is that the user can easily dial numbers and the numbers are arranged in such manner that user can easily dialed it and recognize the digit printed on it as well as the character print on it that helps user to learn more quickly and also makes the product more interactive and the users are going to enjoy the usage of the product and likes such product , the second principal is Flexibility that refers how much the product is capable to perform same task in different manner like in mobile users not only communicate through voice, text now they can also communicate through variety of things like video, emails, blogs and some other social applications like facebook, twiter and msn.
The last one is Robustness that refers to the support that provides users a direction to achieve the goal or to assist them this is also available in the mobile phones now and getting more enhance day by day.

Sunday 17 July 2011

Web Application Vulnerability Scanners

Web Application Vulnerability Scanners are tools designed to automatically scan web applications for potential vulnerabilities. These tools differ from general vulnerability assessment tools in that they do not perform a broad range of checks on a myriad of software and hardware. Instead, they perform other checks, such as potential field manipulation and cookie poisoning, which allows a more focused assessment of web applications by exposing vulnerabilities of which standard VA tools are unaware.
A Web Application Scanner Tool Functional Specification is available.

Contents

[hide]

Web Applications Issues

  • Scripting issues
  • Sources of input: forms, text boxes, dialog windows, etc.
  • Multiple Charset Encodings (UTF-8, ISO-8859-15, UTF-7, etc.)
  • Regular expression checks
  • Header integrity (e.g. Multiple HTTP Content Length, HTTP Response Splitting)
  • Session handling/fixation
  • Cookies
  • Framework vulnerabilities(Java Server Pages, .NET, Ruby On Rails, Django, etc.)
  • Success control: front door, back door vulnerability assessment
  • Penetration attempts versus failures

Technical vulnerabilities

  • Unvalidated input:
    • Tainted parameters - Parameters users in URLs, HTTP headers, and forms are often used to control and validate access to sentitive information.
    • Tainted data
  • Cross-Site Scripting flaws:
    • XSS takes advantage of a vulnerable web site to attack clients who visit that web site. The most frequent goal is to steal the credentials of users who visit the site.
  • Content Injection flaws:
    • Data injection
    • SQL injection - SQL injection allows commands to be executed directly against the database, allowing disclosure and modification of data in the database
    • XPath injection - XPath injection allows attacker to manipulate the data in the XML database
    • Command injection - OS and platform commands can often be used to give attackers access to data and escalate privileges on backend servers.
    • Process injection
  • Cross-site Request Forgeries

Security Vulnerabilities

  • Denial of Service
  • Broken access control
  • Path manipulation
  • Broken session management (synchronization timing problems)
  • Weak cryptographic functions, Non salt hash

Architectural/Logical Vulnerabilities

  • Information leakage
  • Insufficient authentification
  • Password change form disclosing detailed errors
  • Session-idle deconstruction not consistent with policies
  • Spend deposit before deposit funds are validated

Other vulnerabilities

  • Debug mode
  • Thread Safety
  • Hidden Form Field Manipulation
  • Weak Session Cookies: Cookies are often used to transit sensitive credentials, and are often easily modified to escalate access or assume another user's identify.
  • Fail Open Authentication
  • Dangers of HTML Comments

Related Links

Tuesday 31 May 2011

Updating and Installing Nessus on BackTrack 5

One of my favorite tools in my toolbox is the Vulnerability Scanner Nessus, in part because of it’s accuracy and because I’m part of one of the teams that works adding new cool stuff to it during the day. So I was super happy to see it included as part of Backtrack. Ever since I started working professionally in security Nessus has been part of my toolkit, once nessuscmd was out it became more integral in to my workflow because I could automate stuff for my customers. Before I had to always follow some weird procedures some times to get Nessus installed on the early versions of Backtrack and those procedures where always prone to breaking when I had to update to a latest version. I would like to share how to activate your copy of Nessus in Backtrack and some of the caveats that are present when activating it depending of your setup. The first step is to have Bactrack installed as a virtual machine on your pentest/audit rig or installed locally on the hard drive of the machine. Do not try to activate by running it from the bootable DVD or from a USB Drive if you intend of using it on several physical machines because the registration process marries the activation to that specific host. So moving the VM from one host to another or the USB drive depending on how you configured Backtrack is more than likely to require re-activation of your copy of Nessus. So one of the first thing you need to do if using a professional feed go to http://support.tenable.com and log in and go in to Manage Activation Codes and get your professional feed activation code. If you will be using a Home Feed you will have to go to http://www.nessus.org/products/nessus/nessus-plugins/obtain-an-activation-code and register for a Home Feed, you will receive your activation code to the email you provided. Once you have the activation code you can proceed to activate it on your Backtrack Machine running as root: 

root@bt:~# /opt/nessus/bin/nessus-fetch --register M4D0-EWWQ-1EZU-3KSN
Your activation code has been registered properly - thank you.
Now fetching the newest plugin set from plugins.nessus.org...
Your Nessus installation is now up-to-date.
If auto_update is set to 'yes' in nessusd.conf, Nessus will
update the plugins by itself.
And yes the activation code in the example if a fake one for demonstration purposes only.
The next step is to add an admin user on this box so it can connect, create profiles, policies and launch scans:"
root@bt:~# /opt/nessus/sbin/nessus-adduser
Login : carlos
Login password : 
Login password (again) : 
Do you want this user to be a Nessus 'admin' user ? (can upload plugins, etc...) (y/n) [n]: y
User rules
----------
nessusd has a rules system which allows you to restrict the hosts
that carlos has the right to test. For instance, you may want
him to be able to scan his own host only.
Please see the nessus-adduser manual for the rules syntax
Enter the rules for this user, and enter a BLANK LINE once you are done : 
(the user can have an empty rules set)
Login             : carlos
Password         : ***********
This user will have 'admin' privileges within the Nessus server
Rules             :
Is that ok ? (y/n) [y] 
User added

Thursday 14 April 2011

Next Generation Networks

Wireless Sensor Networks
A – Hardware, Architecture, Physical Layer, MAC Layer, Energy Study
1.        A Probabilist Approach to Predict the Energy Consumption in Wireless Sensor Networks
Raquel A. F. Mini, Badri Nath, Antonio A. F. Loureiro
IV Workshop de Comunicação sem Fio e Computação Móvel, São Paulo, Brazil, October 23-25 2002 (to appear).  (http://www.cs.rutgers.edu/~mini/wcsf.ps)
2.        A transmission control scheme for media access in sensor networks Alec Woo and David E. Culler The seventh annual international conference on Mobile computing and networking 2001 July 16 - 21, 2001, Rome Italy. Pages 221-235 (http://www.acm.org/pubs/citations/proceedings/comm/381677/p221-woo/)
3.        An Energy-Efficient Mac protocol for Wireless Sensor Networks
Wei Ye and John Heidemann and Deborah Estrin

(http://citeseer.nj.nec.com/461814.html)
4.       Algorithmic Transforms for Efficient Energy Scalable Computation A. Sinha, A. Wang, A. P. Chandrakasan Proceedings of the International Symposium on Low Power Electronics and Design (ISLPED), 2000. (http://citeseer.nj.nec.com/sinha00algorithmic.html)
5.       Application-Specific Protocol Architectures for Wireless Networks
Wendi Beth Heinzelman
Ph.D. thesis, Massachusetts Institute of Technology, 2000
(
http://citeseer.nj.nec.com/heinzelman00applicationspecific.html)
6.       Design Considerations for Distributed Microsensor Systems
Anantha Chandrakasan, Rajeevan Amirtharajah, SeongHwan Cho, James Goodman, Gangadhar Konduri, Joanna Kulik, Wendi Rabiner, Alice Wang

(http://citeseer.nj.nec.com/chandrakasan99design.html)
7.        Dynamic Power Management in Wireless Sensor Networks Amit Sinha and Anantha Chandrakasan IEEE Design & Test of Computers, Vol. 18, No. 2, March-April 2001 (http://computer.org/dt/dt2001/d2062abs.htm)
8.        Emerging Challenges: Mobile Networking for "Smart Dust" Joseph M. Kahn, Randy Howard Katz, and Kristofer S. J. Pister (http://citeseer.nj.nec.com/375904.html)
9.        Energy Complexity: A Metric for Energy Consumption of Ad Hoc Network Protocols Rajesh Bhairampally
(
http://www.utdallas.edu/~rajesh/resume/mobihoc02.pdf)
10.     Instrumenting the World with Wireless Sensor Networks D. Estrin, L. Girod, G. Pottie, M. Srivastava International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2001), Salt Lake City, Utah, May 2001 (http://www.isi.edu/scadds/papers/ICASSP-2001.ps)
11.   Low Power Systems for Wireless Microsensors
K. Bult, A. Burstein, D. Chang, M. Dong, M. Fielding, E. Kruglick, J. Ho, F. Lin, T.H. Lin, W.J. Kaiser, H. Marcy, R. Mukai, P. Nelson, F. Newberg, K.S.J. Pister, G. Pottie, H. Sanchez, O.M. Stafsudd, K.B. Tan, C.M. Ward, S. Xue, J. Yao. Proceedings of the 1996 International Symposium on Low Power Electronics and Design. Monterey, CA, USA, 12-14 Aug. 1996, pp. 17-22.  (http://www.janet.ucla.edu/WINS/download_publications/islped96.pdf)
12.     Low-Power Wireless Sensor Networks
Rex Min, Manish Bhardwaj, Seong-Hwan Cho, Eugene Shih, Amit Sinha, Alice Wang, Anantha Chandrakasan

(http://citeseer.nj.nec.com/433120.html)
13.     Measuring and reducing energy consumption of network interfaces in hand-held devices M. Stemm and R. H. Katz
IEICE Transactions on Communications, vol.E80-B, no.8, p. 1125-31, 1997
(http://citeseer.nj.nec.com/stemm97measuring.html)
14.     Next century challenges: Mobile networking for 'smart dust' J.M. Kahn, R.H. Katz, K.S.J. Pister, Proc. MOBICOM, 1999, Seattle, 271-278 (http://citeseer.nj.nec.com/kahn99next.html)
15.     Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks Eugene Shih, Seong-Hwan Cho, Nathan Ickes, Rex Min, Amit Sinha, Alice Wang and Anantha Chandrakasan The seventh annual international conference on Mobile computing and networking 2001 July 16 - 21, 2001, Rome Italy. Pages 272 - 287 (http://www.acm.org/pubs/citations/proceedings/comm/381677/p272-shih/)
16.     Power-Aware Systems Manish Bhardwaj, Rex Min and Anantha Chandrakasan (http://www-mtl.mit.edu/research/icsystems/uamps/pubs/manishb_asilomar00.pdf)
17.     PicoRadio Supports Ad Hoc Ultra-Low Power Wireless Networking
J
an M. Rabaey, M. Josie Ammer, Julio L. da Silva Jr., Danny Patel. and Shad Roundy IEEE Computer, Vol. 33, No. 7, July 2000 (http://www.computer.org/computer/co2000/r7042abs.htm)
18.     Prediction-based Monitoring in Sensor Networks: Taking Lessons from MPEG Samir Goel and Tomasz Imielinski, Technical Report DCS-TR-438, Department of Computer Science, Rutgers University, June 2001. Submitted for Publication (http://paul.rutgers.edu/~gsamir/#publications)
19.     Protocols for self-organization of a wireless sensor network K. Sohrabi, J. Gao, V. Ailawadhi, G.J. Pottie. IEEE Personal Communications, vol. 7, no. 5, pp. 16-27, Oct. 2000. (http://www.ee.ucla.edu/faculty/profpapers/pottie_IEEE-pers-comm_oct00.pdf)
20.     Sensor Information Networking Architecture Chavalit Srisathapornphat, Chaiporn Jaikaeo and Chien-Chung Shen Proceedings of the 2000 International Workshop on Parallel Processing Copyright (c) 2000 Institute of Electrical and Electronics Engineers, Inc. All rights reserved. (http://www.computer.org/proceedings/icpp/0771/07710023abs.htm)
21.     System architecture directions for networked sensors J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, K. Pister Copyright 2000 ACM (http://citeseer.nj.nec.com/382595.html)
22.     Upper Bounds on the Lifetime of Sensor Networks Manish Bhardwaj Timothy
(http://citeseer.nj.nec.com/429731.html)
23.     Wireless Integrated Network Sensors G.J. Pottie, W.J. Kaiser Communications of the ACM, vol. 43, no. 5, pp. 551-8, May 2000. (http://www.acm.org/pubs/citations/journals/cacm/2000-43-5/p51-pottie/)
24.     Wireless integrated network sensors: Low power systems on a chip G. Asada, M. Dong, T. S. Lin, F. Newberg, G. Pottie, W. J. Kaiser European Solid State Circuits Conference, The Hague, Netherlands, 1998, October. (http://citeseer.nj.nec.com/278712.html)

B – Network Layer
B.1 – Addressing Mechanisms
26.     Random, Ephemeral Transaction Identifiers in Dynamic Sensor Networks Jeremy Elson and Deborah Estrin
T
o appear in Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS-21) April 16-19, 2001, Phoenix, Arizona, USA.
A
lso published as UCLA CS Technical Report 200027 (http://www.circlemud.org/~jelson/writings/retri/)

B.2 – Routing
27.   Adaptive protocols for information dissemination in wireless sensor networks Wendi Rabiner Heinzelman, Joanna Kulik and Hari Balakrishnan Proceedings of the fifth annual ACM/IEEE international conference on Mobile computing and networking. Pages 174-185 August 15 - 19, 1999, Seattle, WA USA (http://www.acm.org/pubs/citations/proceedings/comm/313451/p174-heinzelman/)
28.   Building Efficient Wireless Sensor Networks with Low-Level Naming
John Heidemann, Fabio Silva, Chalermek Intanagonwiwat, Ramesh Govindan, Deborah Estrin, and Deepak Ganesan.
In Proceedings of the Symposium on Operating Systems Principles, pp. 146-159. Chateau Lake Louise, Banff, Alberta, Canada, ACM. October, 2001.
(http://citeseer.nj.nec.com/456986.html)
29.   Data-centric storage in Sensornets
Sylvia Ratnasamy, Deborah Estrin, Ramesh Govindan, Brad Karp, Scott Shenker, Li Yin, Fang Yu
Submitted for review. February 1st, 2002

(
http://lecs.cs.ucla.edu/~estrin/papers/dht.pdf)
30.     Data Gathering in Sensor Networks using the Energy Delay Metric Stephanie Lindsey, Cauligi Raghavendra e Krishna Sivalingam In International Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile Computing, (San Francisco, CA), Apr. 2001 (http://www.eecs.wsu.edu/~dawn/Papers/2001/e_d_final.pdf)
31.     Directed diffusion: a scalable and robust communication paradigm for sensor networks Chalermek Intanagonwiwat, Ramesh Govindan and Deborah Estrin Proceedings of the sixth annual international conference on Mobile computing and networking.  Pages 56-67 August 6 - 11, 2000, Boston, MA USA (http://www.acm.org/pubs/citations/proceedings/comm/345910/p56-intanagonwiwat/)
32.   Energy-Efficient Communication Protocol for Wireless Microsensor Networks
W. Heinzelman and A. Chandrakasan and H. Balakrishnan
In Proccedings of the Hawaii Conference on System Sciences, January 2000
(http://dlib.computer.org/conferen/hicss/0493/pdf/04938020.pdf)
33.   Geographical and Energy Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks
Yan Yu, Ramesh Govindan and Deborah Estrin
UCLA Computer Science Department Technical Report UCLA/CSD-TR-01-0023, May 2001
(http://citeseer.nj.nec.com/461988.html)
34.   Impact of Network Density on Data Aggregation in Wireless Sensor Networks
Calermek Intanagonwiwat, Deborah Estrin, Ramesh Govindan, and John Heidemann
Technical Report 01-750, University of Southern California Computer Science Department, November, 2001
(http://citeseer.nj.nec.com/460600.html)
35.     Negotiation-based Protocols for Disseminating Information in Wireless Sensor Networks Joanna Kulik, Wendi Rabiner Heinzelman, and Hari Balakrishnan ACM/IEEE Int. Conf. on Mobile Computing and Networking, Seattle, WA, Aug. 1999 (http://citeseer.nj.nec.com/335631.html)
36.     Next century challenges: scalable coordination in sensor networks Deborah Estrin, Ramesh Govindan, John Heidemann and Satish Kumar Proceedings of the fifth annual ACM/IEEE international conference on Mobile computing and networking.     Pages 263-270 August 15 - 19, 1999, Seattle, WA USA (http://www.acm.org/pubs/citations/proceedings/comm/313451/p263-estrin/)
37.     Rumor Routing Algorithm For Sensor Networks
David Braginsky and Deborah Estrin
Under submission to International Conference on Distributed Computing Systems (ICDCS-22), November 2001.
(http://citeseer.nj.nec.com/462331.html)
38.     Service Differentiation in Sensor Networks Sudeept Bhatnagar, Budhaditya Deb and Badri Nath To appear in the Fourth International Symposium on Wireless Personal Multimedia Communications, September 2001.(.ps) (http://paul.rutgers.edu/~sbhatnag/publications.html)

C – Distributed Algorithms
C.1 – Topology Discovery
39.     A Topology Discovery Algorithm for Sensor Networks with Applications to Network Management Budhaditya Deb, Sudeept Bhatnagar and Badri Nath Department of Computer Science, Rutgers University, Technical Report, DCS-TR-441 (.pdf). (http://paul.rutgers.edu/~sbhatnag/publications.html)
40.     Ascent: Adaptive Self-Configuring sEnsor Network Topologies Alberto Cerpa and Deborah Estrin UCLA Computer Science Department Technical Report UCLA/CSD-TR 01-0009, May 2001. (http://lecs.cs.ucla.edu/~estrin/papers/Ascent-UCLA-tech-report.ps)

C.2 – Location Mechanisms
41.     Ad hoc Positioning System (APS) Dragos Niculescu and Badrinath Submitted to GLOBECOM 2001 (http://www.cs.rutgers.edu/~dnicules/research/aps/aps_globecom.pdf)
42.     Adaptive Beacon Placement Nirupama Bulusu, John Heidemann, and Deborah Estrin In Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS-21), pages 489--498, Phoenix, Arizona, USA, April 2001 (http://citeseer.nj.nec.com/bulusu01adaptive.html)
43.     Convex Position Estimation in Wireless Sensor Networks Lance Doherty, Kristofer SJ Pister, Laurent El Ghaoui Dept. of Electrical Engineering and Computer Proc. of IEEE Infocom 2001. (http://www.eecs.berkeley.edu/~elghaoui/pdffiles/Infocom.pdf)
44.     Dynamic fine-grained localization in Ad-Hoc networks of sensors Andreas Savvides, Chih-Chieh Han and Mani B. Strivastava The seventh annual international conference on Mobile computing and networking 2001. July 16 - 21, 2001, Rome Italy Pages 166-179 (http://www.acm.org/pubs/citations/proceedings/comm/381677/p166-savvides/)
45.     GPS-less Low Cost Outdoor Localization For Very Small Devices Nirupama Bulusu, John Heidemann, and Deborah Estrin IEEE Personal Communications Magazine, 7 (5 ), pp. 28-34, October, 2000. (http://www.isi.edu/~johnh/PAPERS/Bulusu00a.html)
46.     Scalable Coordination for wireless sensor networks: Self-Configuring Localization Systems Nirupama Bulusu, Deborah Estrin, Lewis Girod and John Heidemann International Symposium on Communication Theory and Applications (ISCTA 2001), Ambleside, Lake District, UK, July 2001.  (http://www.isi.edu/scadds/papers/iscta-2001.ps)

C.3 – Time Synchronization
47.     Time Synchronization for Wireless Sensor Networks Jeremy Elson and Deborah Estrin To appear in Proceedings of the 2001 International Parallel and Distributed Processing Symposium (IPDPS), Workshop on Parallel and Distributed Computing Issues in   Wireless Networks and Mobile Computing. (http://www.circlemud.org/~jelson/writings/timesync/)

C.4 – Others
48.   Exposure In Wireless Ad-Hoc Sensor Networks Seapahn Meguerdichian, Farinaz Koushanfar, Gang Qu and Miodrag Potkonjak The seventh annual international conference on Mobile computing and networking 2001 July 16 - 21, 2001, Rome Italy. Pages 139-150 (http://www.acm.org/pubs/citations/proceedings/comm/381677/p139-meguerdichian/)
49.   Localized Algorithms In Wireless Ad-Hoc Networks: Location Discovery And Sensor Exposure
Seapahn Meguerdichian, Sasa Slijepcevic, Vahag Karayan, Miodrag Potkonjak
 
MobiHoc 2001, Long Beach, CA USA
(http://citeseer.nj.nec.com/461776.html)
50.     Residual Energy Scans for Monitoring Wireless Sensor Networks Yonggang Jerry Zhao, Ramesh Govindan and Deborah Estrin IEEE Wilress Communications and Networking Conference (WCNC'02) , Orlando, FL, USA, March 17-21, 2002 (http://citeseer.nj.nec.com/460449.html)

D – Simulations
51.     On modeling networks of wireless microsensors Andreas Savvides, Sung Park and Mani B. Srivastava Joint international conference on on Measurement and modeling of computer systems June 16 - 20, 2001, Cambridge, MA United States Pages 318-319 (http://www.acm.org/pubs/citations/proceedings/metrics/378420/p318-savvides/)
52.     SensorSim: a simulation framework for sensor networks Sung Park, Andreas Savvides and Mani B. Srivastava Proceedings of the 3rd ACM international workshop on Modeling, analysis and simulation of wireless and mobile systems.  Pages 104-111 August 20, 2000, Boston, MA USA (http://www.acm.org/pubs/citations/proceedings/comm/346855/p104-park/)

E – Applications
53.     Habitat Monitoring: Application Driver for Wireless Communications Technology Alberto Cerpa, Jeremy Elson, Deborah Estrin, Lewis Girod, Michael Hamilton, Jerry Zhao To appear in the Proceedings of the First ACM SIGCOMM Workshop on Data Communications in Latin America and the Caribbean, 3-5 April, 2001, San Jose, Costa Rica. Also published as UCLA Computer Science Technical Report 200023, December 2000. (http://www.circlemud.org/~jelson/writings/costarica/costarica.html)
54.     Research Challenges in Wireless Networks of Biomedical Sensors Loren Schwiebert, Sandeep K.S. Gupta and Jennifer Weinmann The seventh annual international conference on Mobile computing and networking 2001, 2001, Pages 151-165 (http://www.acm.org/pubs/citations/proceedings/comm/381677/p151-schwiebert/)
55.     Smart Kindergarten: Sensor-based Wireless Networks for Smart Developmental Problem-solving Environments Mani Srivastava, Richard Muntz and Miodrag Potkonjak The seventh annual international conference on Mobile computing and networking 2001 July 16 - 21, 2001, Rome Italy. Pages 132 - 138 (http://www.acm.org/pubs/citations/proceedings/comm/381677/p132-srivastava/)
56.     A taxonomy of Wireless Micro-Sensor Network Models
Sameer Tilak, Nael B. Abu-Ghazaleh and Wendi Heinzelman 
(
http://www.cs.binghamton.edu/~sameer/publications/main.pdf)


Wireless Ad Hoc Network
57.     Adaptive Energy-Conserving Routing for Multihop Ad Hoc Networks Ya Xu, John Heidemann, and Deborah Estrin Research Report527,  USC/Information Sciences Institute, October, 2000. (http://www.isi.edu/~johnh/PAPERS/Xu00a.html)
58.     Energy efficient adaptive wireless network design Paul J.M. Havinga, Gerard J.M. Smit, Martinus Bos The Fifth Symposium on Computers and Communications (ISCC'00), Antibes, France, July 3-7, 2000 (http://citeseer.nj.nec.com/255365.html)
59.     Geography-informed energy conservation for Ad Hoc routing Ya Xu, John Heidemann and Deborah Estrin The seventh annual international conference on Mobile computing and networking 2001 July 16 - 21, 2001, Rome Italy.  Pages 70 - 84 (http://www.acm.org/pubs/citations/proceedings/comm/381677/p70-xu/)
60.     PAMAS - Power Aware Multi-Access protocol with Signalling for Ad Hoc Networks S. Singh and C. S. Raghavendra ACM ComputerCommunications Review, 1999 (http://citeseer.nj.nec.com/157040.html)
61.     Power-aware localized routing in wireless networks I. Stojmenovic and Xu Lin IEEE Int. Parallel and Distributed Processing Symp., Cancun, Mexico, May 1-5, 2000, to appear. (http://citeseer.nj.nec.com/385034.html)
62.     Reducing the Energy Consumption of Group Driven Ad-hoc Wireless Communication Sharad Agarwal, Randy H. Katz and Anthony D. Joseph Report No. UCB/CSD-1-1127  January 2001  (http://ncstrl.cs.cornell.edu/Dienst/UI/1.0/Display/ncstrl.ucb/CSD-01-1127)
63.     Scalable Routing Strategies for Ad-hoc Wireless Networks A. Iwata, C.-C. Chiang, G. Pei, M. Gerla, and T.-W. Chen. IEEE JSAC, August 1999 (http://citeseer.nj.nec.com/iwata99scalable.html)

URL's

The Computer for the 21st Century M. Weiser Scientific American, September 1991 http://nano.xerox.com/hypertext/weiser/SciAmDraft3.html