A common breach of network security is the class of attacks called Worm-virus. This paper proposes a language called Triton whose goal is to efficiently and effectively safeguard ...
Jangha Kim, Byungwook Song, Kanghee Lee, Sangwook ...
— A multi-hop virtual cellular network (VCN) was proposed for future mobile communication systems. In VCN, the transmitted signal from a mobile terminal is relayed via multi-hop ...
Lalla Soundous El Alami, Eisuke Kudoh, Fumiyuki Ad...
In order to obtain a suitable model of the universe of discourse of some information systems, it is important to allow the description of imprecise objects with temporal indetermi...
Ed Porto Bezerra, Ulrich Schiel, Bernardo Lula Jr.
In a shared medium network like the 802.11b WLAN, predicting the quality of VoIP calls from the resource usage of the wireless medium is highly desirable. Analyzing the bandwidth ...
Based on a classical convex hull algorithm called Gift-Wrapping, the purpose of the paper is to provide a new algorithm for computing the vertices of a polytope called preimage - ...