: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
An increasing variety of malware, such as worms, spyware and adware, threatens both personal and business computing. Remotely controlled bot networks of compromised systems are gr...
The proposed Fuzzy Logic Controller (FLC) is a novel approach for dynamic buffer tuning at the user/server level. It eliminates buffer overflow by ensuring that the buffer length ...
Wilfred W. K. Lin, Allan K. Y. Wong, Tharam S. Dil...
— In a WLAN subject to variable wireless channel conditions, rate adaptation plays an important role to more efficiently utilize the physical link. However, the existing rate ada...
Qixiang Pang, Victor C. M. Leung, Soung Chang Liew
Given that road accidents occur in a real-time environment, simple crisp functions would barely provide an estimate of the gravity of the life situation. Fuzzy-based systems are a...
K. Venkatesh, Archana Ramesh, M. Alagusundaram, J....