In the future 4G wireless networks will span across different administrative domains. In order to provide secure seamless handovers in such an environment the Context Transfer Pro...
To achieve better throughput, many hard drive manufacturers use internal queues and scheduling to take advantage of vendor-specific characteristics and knowledge. While this tren...
Mark J. Stanovich, Theodore P. Baker, An-I Andy Wa...
—In this paper, link level adaptation algorithms in a system applying spatial multiplexing in the presence of channel uncertainty are considered. The first part of this paper de...
Alert correlation systems are post-processing modules that enable intrusion analysts to find important alerts and filter false positives efficiently from the output of Intrusion...
The hash function Blue Midnight Wish (BMW) is a candidate in the SHA-3 competition organised by the U.S. National Institute of Standards and Technology (NIST). BMW was selected fo...