Abstract— Human can efficiently grasp and dextrously manipulate various objects using their fingers cooperatively. When they attain proficiency in the rotating manipulation of...
Yuichi Kurita, Kazuyuki Nagata, Jun Ueda, Yoshio M...
— In this paper, we present an analytical TCP model that takes into account of several issues that were ignored in the other existing models (such as those in [15], [19]), i.e., ...
Emerging applications involving low-cost wireless sensor networks motivate well optimization of multi-user orthogonal frequency-division multiple access (OFDMA) in the power-limite...
In this paper we present an efficient countermeasure against code injection attacks. Our countermeasure does not rely on secret values such as stack canaries and protects against a...
The trend towards value-added Internet services causes network providers to deploy new network based quality-of-service and security services. Today, however, the customer has onl...