Code injection continues to pose a serious threat to computer systems. Among existing solutions, W X is a notable approach to prevent the execution of injected code. In this paper...
In many computer graphics and computer-aided design problems, it is very common to find a smooth and well structured surface to fit a set of unstructured 3-dimensional data. Altho...
Abstract— Link quality measurement (LQM), i.e. packet reception ratio (PRR) measurement, is becoming an indispensable component in multihop wireless networks. However, in all the...
Kai Zeng, Shucheng Yu, Kui Ren, Wenjing Lou, Yanch...
A Shrew attack, which uses a low-rate burst carefully designed to exploit TCP’s retransmission timeout mechanism, can throttle the bandwidth of a TCP flow in a stealthy manner....
—The IEEE 802.15.4 standard has no provisions for rate sensitive applications because of its ability to operate in pure CSMA/CA or TDMA modes. Some operating scenarios for rate-s...