Securing ad hoc networks in a fully self-organized way is effective and light-weight, but fails to accomplish trust initialization in many trust deficient scenarios. To overcome t...
Kui Ren, Tieyan Li, Zhiguo Wan, Feng Bao, Robert H...
Estimating remaining defects or failures in software can help test managers make release decisions during testing. Several methods exist to estimate defect content, among them a v...
—This paper presents a generalized linear quadratic Gaussian and loop transfer recovery method to design an optimal lateral control system for an F-16 aircraft. The traditional l...
The problem of indexing time series has attracted much interest. Most algorithms used to index time series utilize the Euclidean distance or some variation thereof. However, it has...
How can we get such reliable behavior from the mind when the brain is made up of such unreliable elements as neurons? We propose that the answer is related to the emergence of stab...