We quantatively analyze the differences between a realistic mobility model, TRANSIMS, and several synthetic mobility models. New synthetic models were created by modifying the sta...
D. Charles Engelhart, Anand Sivasubramaniam, Chris...
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
We combine multiple description (MD) quantization, entropy coding, and data partitioning to improve the error resiliency of images over varying packet loss channels. Our proposed ...
Over the last decade, a dramatic increase has been observed in the need for generating and organising data in the course of large parameter studies, performance analysis, and soft...
Radu Prodan, Thomas Fahringer, Michael Geissler, G...
For in-network storage schemes, one maps data, indexed in a logical space, to the distributed sensor locations. When the physical sensor network has an irregular shape and possibl...