Resource-depletion attacks against IEEE 802.11 access points (APs) are commonly executed by flooding APs with fake authentication requests. Such attacks may exhaust an AP’s memor...
Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhel...
Decision making lies at the very heart of many psychiatric diseases. It is also a central theoretical concern in a wide variety of fields and has undergone detailed, in-depth, ana...
Quentin J. M. Huys, Joshua T. Vogelstein, Peter Da...
Abstract-- The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustwor...
Abstract-- This article investigates linearly combined motion-compensated signals for video compression. In particular, we discuss multiple motion-compensated signals that are join...
Emerging memory technologies such as STT-RAM, PCRAM, and resistive RAM are being explored as potential replacements to existing on-chip caches or main memories for future multi-co...
Asit K. Mishra, Xiangyu Dong, Guangyu Sun, Yuan Xi...