Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Service availability in wireless networks is highly dependent on efficient resource allocation and guaranteed Quality of Service (QoS) amid overloads and failures. This paper add...
Procurement is one of the major activities in the Manufacturing Resource Planning (MRP II), which is closely coupled with inventory management. Any improvement in this area will h...
The relentless push for high performance in custom digital circuits has led to renewed emphasis on circuit optimization or tuning. The parameters of the optimization are typically...
This paper presents a trace-driven simulation study of two classes of retransmission timeout (RTO) estimators in the context of realtime streaming over the Internet. We explore th...