Abstract—Understanding user behavior in wireless environments is useful for a variety of reasons ranging from the design of better sleep algorithms for components of mobile devic...
by allowing designers to model their systems at different abstraction levels, providing them omatic model transformations to incrementally refine abstract models into more concrete...
Cristina Vicente-Chicote, Fernando Losilla, B&aacu...
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
This paper describes the design process of a modular system for supporting physical and cognitive rehabilitation in the swimming pool. In such an environment, the therapist is cal...
Much previous work has examined the wireless power control problem using tools from game theory, an economic concept which describes the behavior of interdependent but non-coopera...