— In existing query-based routing protocols in wireless sensor networks (WSNs), a node either keeps precise route information to desired events, such as in event flooding, or do...
Program checking technology is now a mature technology, but is not yet used on a large scale. We identify one cause of this gap in the decoupling of checking tools from the everyd...
Metamorphic malware — including certain viruses and worms — rewrite their code during propagation. This paper presents a method for normalizing multiple variants of metamorphi...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...
— A novel smart antenna is described, which is conceived as a low complexity inexpensive upgrade for IEEE 802.11b/g Wireless Local Area Network (WLAN) systems. Using smart antenn...
Timothy J. Harrold, Dean C. Kemp, Mark A. Beach, C...
In this contribution we propose a space-time decision feedback equalization (ST-DFE) assisted multiuser detection (MUD) scheme for multiple antenna aided space division multiple a...