—Malware and botnets pose a steady and growing threat to network security. Therefore, packet analysis systems examine network traffic to detect active botnets and spreading worm...
The tensor-based morphometry (TBM) has been widely used in characterizing tissue volume difference between populations at voxel level. We present a novel computational framework f...
Seung-Goo Kim, Moo K. Chung, Jamie L. Hanson, Bria...
The availability of heterogeneous wireless interfaces and of growing computing resources on widespread portable devices pushes for enabling innovative deployment scenarios where mo...
We study a wireless network under the 802.11 random access protocol, supporting multiple physical layer rates. Based on models for the effective packet rates achieved at the MAC ...
MIS (Mobile Internet Services) architecture is designed for secure connection and fast handover with wireless LAN. This architecture consists of three protocols, MISP (Mobile Inte...
Hitoshi Morioka, Hiroshi Mano, Motoyuki Ohrnori, M...