The purpose of this paper is to investigate the distinctive characteristics of the competitive mechanism in the digital economy and information product markets. Specific propertie...
In this paper, we present a near ML-achieving sphere decoding algorithm that reduces the number of search operations in the sphere-constrained search. Specifically, by adding a pro...
Emerging high-end applications require a rich set of network provisioning services that go beyond the traditional source-destination, end-to-end path service. They also require hig...
In order to effectively use machine learning algorithms, e.g., neural networks, for the analysis of survival data, the correct treatment of censored data is crucial. The concordan...
One of the main problems of network security is Distributed Denial of Service (DDoS) caused by TCP SYN packet flooding. To counteract SYN flooding attack, several defense methods...