Establishing criteria for knowledge management is an imperative aspect of management as it helps determine results. Our research indicated that widely-accepted criteria and perfor...
The problem of computing bandwidth guaranteed paths for given flow requests in an ad-hoc network is complicated because neighboring links share the medium. We define the path wi...
Zhanfeng Jia, Rajarshi Gupta, Jean C. Walrand, Pra...
We introduce a novel worm containment strategy that integrates two complementary worm quarantine techniques. The two techniques are linked, with one strategy employing the other a...
Abstract. We implement and demonstrate a passive attack on the Bluetooth authentication protocol used to connect two devices to each other. Using a protocol analyzer and a brute-fo...
Archived biomedical literature and sequence data are growing rapidly. The Open Archives Initiative's Protocol for Metadata Harvesting (OAI-PMH) [1] provides a convenient way ...