Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...
This paper proposes a decentralized adaptive soft frequency reuse scheme for the uplink of a 4G long-term evolution (LTE) system. While universal frequencies reuse (UFR) is being ...
This paper proposes a new methodology to model the distribution of finite size content to a group of users connected through an overlay network. Our methodology describes the distr...
Abstract--With the convergence of ultra-low-power communications and energy-harvesting technologies, networking selfsustainable ubiquitous devices is becoming feasible. Hence, we h...
Maria Gorlatova, T. Sharma, D. Shrestha, E. Xu, Ji...
— Sensor networks (SNETs) for monitoring spatial phenomena has emerged as an area of significant practical interest. We focus on the important problem of detection of distribute...