Abstract. In order to obtain and maintain control, kernel malware usually makes persistent control flow modifications (i.e., installing hooks). To avoid detection, malware develope...
Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Xia...
Traffic state estimation is a challenging problem for the transportation community due to the limited deployment of sensing infrastructure. However, recent trends in the mobile pho...
Daniel B. Work, Olli-Pekka Tossavainen, Sebastien ...
The min-plus theory of greedy shapers has been developed after Cruz's results on the calculus of network delays. An example of greedy shaper is the buffered leaky bucket cont...
Wireless mesh networks (WMNs) are comprised of nodes with multiple radio interfaces and provide broadband residential internet access or connectivity to temporal events. Our goal i...
Elias Z. Tragos, Raffaele Bruno, Emilio Ancillotti...
Parallel changes are becoming increasingly prevalent in the development of large scale software system. To further study the relationship between parallel changes and faults, we h...