Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
Abstract—Path computation elements (PCE’s) are used to compute end-to-end paths across multiple areas. Multiple PCE’s may be dedicated to each area to provide sufficient path...
Juanjuan Yu, Yue He, Kai Wu, Marco Tacca, Andrea F...
Context-aware service platforms use context information to customize their services to the current users’ situation. Due to technical limitations in sensors and context reasonin...
Ricardo Neisse, Maarten Wegdam, Marten van Sindere...
This work describes a Java based development platform which is intended to support ad hoc network researchers in application and protocol design. Software development within this ...
We study stochastic models to mitigate the risk of poor Quality-of-Service (QoS) in computational markets. Consumers who purchase services expect both price and performance guaran...