In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Space applications’ users have been relying for the past decades on custom developed software tools capable of addressing short term necessities during critical Spacecraft contro...
The increasing popularity of cloud storage services has lead companies that handle critical data to think about using these services for their storage needs. Medical record databa...
Alysson Neves Bessani, Miguel P. Correia, Bruno Qu...
In a realistic sensor network, in particular with a nonuniform deployment, sensor nodes inevitably have varying workloads. This causes a natural problem that some sensor nodes are...
It is well recognized that novel computational models, devices and technologies are needed in order to sustain the remarkable advancement of CMOS-based VLSI circuits and systems. ...
Xiaobo Sharon Hu, Alexander Khitun, Konstantin K. ...