This paper presents an implementation of feedback control strategy on distributed static scheduling. The static schedule is created taking into account the average execution times...
With the increasing popularity of wireless mesh networks (WMNs), the demand for multimedia services encompassing VoIP, multimedia streaming and interactive gaming is increasing rap...
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
— The basic objective of this work is to assess the utility of two supervised learning algorithms AdaBoost and RIPPER for classifying SSH traffic from log files without using f...
There is a number of recent research lines addressing complex negotiations in highly rugged utility spaces. However, most of them focus on overcoming the problems imposed by the c...