— Despite significant efforts to obtain an accurate picture of the Internet’s connectivity structure at the level of individual autonomous systems (ASes), much has remained un...
Ricardo V. Oliveira, Dan Pei, Walter Willinger, Be...
Intrusion or misbehaviour detection systems are an important and widely accepted security tool in computer and wireless sensor networks. Their aim is to detect misbehaving or faul...
Biological network analysis often aims at the target identification problem, which is to predict which molecule to inhibit (or activate) for a disease treatment to achieve optimu...
Huey-Eng Chua, Sourav S. Bhowmick, Lisa Tucker-Kel...
The Software Communications Architecture (SCA) defined by Joint Tactical Radio Systems (JTRS) is the de facto standard middleware currently adopted by the Software Defined Radio (...
Jaesoo Lee, Jiyong Park, Seunghyun Han, Seongsoo H...
The problem of non-cooperative resource allocation in an amplifyand-forward relay-assisted DS/CDMA system is addressed. The relay designs its amplify-and-forward matrix for achiev...