Abstract—In packet communication systems, a header is attached to the transmitted packet at each layer. The overhead due to the transmission of the individual header can have a s...
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
In many safety-critical applications of embedded systems, the system dynamics exhibits hybrid behaviors. To enable automatic analysis of these embedded systems, many analysis tools...
Biologically focused, agent-based models need many parameters in order to simulate system dynamics. It is often essential to explore the consequences of many parameter vectors bef...
The use of the Plan Recognition/Plan Generation paradigm in the context of corporate training is discussed. The learning environment is grounded on three-level conceptual schemas ...