Abstract—In wireless networks, monotonic, strictly subhomogeneous functions have been used to analyze power control algorithms. We provide an alternative analysis based on the ob...
Multi-constraint quality-of-service routing has become increasingly important as the Internet evolves to support real-time services. Restricted shortest path (RSP) is one of the i...
Abstract— This paper describes the generation of fuzzy signatures to detect some cyber attacks. This approach is an enhancement to our previous work, which was based on the princ...
Many Layered Multicast (LM) congestion control schemes have been proposed to serve different users with heterogeneous bandwidth requirements. Most of the LM algorithms suffer from...
Li Zhu, Nirwan Ansari, Zafer Sahinoglu, Anthony Ve...
In distributed simulations, such as multi-player distributed virtual environments (DVE), power consumption traditionally has not been a major design factor. However, emerging batt...
Weidong Shi, Kalyan S. Perumalla, Richard M. Fujim...