We address the problem of control-channel jamming attacks in multi-channel ad hoc networks. Deviating from the traditional view that sees jamming attacks as a physical-layer vulne...
— This paper investigates spatiotemporal feature extraction from temporal image sequences based on invariance representation. Invariance representation is one of important functi...
Location-awareness and prediction of future locations is an important problem in pervasive and mobile computing. In cellular systems (e.g., GSM) the serving cell is easily availabl...
1 A new method for detecting anomalies in the usage of protocols in computer networks is presented in this work. The proposed methodology is applied to TCP and disposed in two step...
Background: A large number of papers have been published on analysis of microarray data with particular emphasis on normalization of data, detection of differentially expressed ge...