Abstract. Support Vector Machines (SVMs) are well-established Machine Learning (ML) algorithms. They rely on the fact that i) linear learning can be formalized as a well-posed opti...
Abstract. An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been ...
A constrained approximate dynamic programming (ADP) approach is presented for designing adaptive neural network (NN) controllers with closed-loop stability and performance guarante...
Traffic engineering aims to optimize the utilization of existing network resources for load balance and failure recovery, and these are to be accomplished in a scalable fashion. Th...
— Directional antennas are very attractive in Wireless Mesh Networks (WMN). We study the problem of link scheduling and power control in a Time-Division Multiple Access (TDMA) WM...
Vishwanath Ramamurthi, Abu Ahmed Reaz, Sudhir S. D...