The popularity of computer networks broadens the scope for network attackers and increases the damage these attacks can cause. In this context, Intrusion Detection Systems (IDS) a...
In this paper we present a methodology for the evaluation of networked systems communicating using WLAN technology. We show a case study of goal-oriented cooperating robots, for w...
An important issue arising from Peer-to-Peer applications is how to accurately and efficiently retrieve a set of K best matching data objects from different sources while minimizi...
NoC architectures can be adopted to support general communications among multiple IPs over multi-processor Systems on Chip (SoCs). In this work we illustrate the modeling and simu...
The peer-to-peer (P2P) model generally requires that bidirectional and direct communications for contentdelivery be set up between user peers after discovery of the desired conten...
Tetsuya Oh-ishi, Koji Sakai, Tetsuya Iwata, Akira ...