We estimate the number of active machines per hour infected with the Conficker-C worm, using a probability model of Conficker-C's UDP P2P scanning behavior. For an observer wi...
With the emergence of wireless sensor networks and pervasive computing, innovative location-aware technologies and services are being investigated. Several iterative approaches emp...
Mark Terwilliger, Ajay K. Gupta, Ashfaq A. Khokhar...
In many applications, stream data are too voluminous to be collected in a central fashion and often transmitted on a distributed network. In this paper, we focus on the outlier det...
Liang Su, Weihong Han, Shuqiang Yang, Peng Zou, Ya...
— In this paper we propose a distributed system for facilitating cooperative MIMO transmissions in networks without multiple antenna devices. MIMO diversity is achieved by employ...
— This paper addresses the problem of coverage control of a network of mobile sensors. In the current literature, this is commonly formulated as a locational optimization problem...
Ajay Deshpande, Sameera Poduri, Daniela Rus, Gaura...