—We study two-player security games which can be viewed as sequences of nonzero-sum matrix games where at each stage of the iterations the players make imperfect observations of ...
In this paper, we are concerned with a two-hop multi-input-multi-output (MIMO) amplify-andforward (AF) relay system consisting of a source node (SN), a relay node (RN), and a dest...
Jun Ma, Philip V. Orlik, Jinyun Zhang, Ye (Geoffre...
—Flash-crowd attacks are the most vicious form of distributed denial of service (DDoS). They flood the victim with service requests generated from numerous bots. Attack requests...
—Model-based test derivation for real-time system has been proven to be a hard problem for exhaustive test suites. Therefore, techniques for real-time testing do not aim to exhau...
Background: Supertree methods comprise one approach to reconstructing large molecular phylogenies given multi-marker datasets: trees are estimated on each marker and then combined...